SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Agenda
DAY 1: 5 July 2012, Kings Place, London
                      Session 2: The Security Challenges
                      1630-1655      Privacy and Data Security           Mark Durrant, Logica
                      1655-1720      Cyber and Infrastructure Security   Alex Baxendale,
                                                                         Logica
                      1720-1740      DCC Update – The Logica Perspective Tara McGeehan,
                                                                         Logica
                      1740-1745      Closing Remarks                     Ana Domingues,
                                                                         Logica
                      1745-1800      Scott Moorhouse (Olympics)          Scott Moorhouse

                      1800-1900      Informal Networking over drinks




© Logica 2012. All rights reserved
Getting Smart!

Smart Utilities:
Smart Metering - Information Security and Data Protection

Mark Durrant | Information Security & Data Protection Officer
Smart Metering – Where are we now

• Technical Specifications have been developed and are to be
   published

• Government recently completed a consultation on data access and
   privacy which will be used to develop a framework for access to
   Smart Meter data

• Data privacy to be built in to the implementation programme –
   ‘Privacy by Design’

• Mass roll-out to commence in Q4 2014




© Logica 2012. All rights reserved
Smart Meters and Personal Data

Following types of Data will be processed
• Smart Meter ID Number
• Metadata re configuration of meter
• Description of message being transmitted (e.g. meter
  reading/tamper alert)
• Date and Time Stamp
• Message content (meter readings; alerts; network level
  information)

Personal Data under the Data Protection Act 1998

“…data which relates to a living individual who can be identified from
those data, or from those data and other information which is in the
possession of, or is likely to come into the possession of, the data
controller”.


© Logica 2012. All rights reserved
Smart Meters and Personal Data

Consumer Access

Access Smart Meter Data through:
• In Home Display (IHD)
• HAN (13 months of consumption data)
• Monthly Bills from Supplier
• On line portals provided by the supplier

Supplier System must ensure
• Smart Meter Data is only visible to consumer within the home
• New occupants cannot view previous occupants Smart Meter Data
• Customer has choice as to level of data included in bills
• Suppliers must ensure security of portal and customer data can
  only be accessed by the account holder



© Logica 2012. All rights reserved
Smart Meters and Personal Data

Supplier Access

There is a balance to be struck between the granularity of data to
ensure the consumer benefits against protecting the consumers
personal data

The government recommends the framework for Smart Meter Data
includes:
• Monthly data an be obtained without consent for billing (monthly
   data can be used for other purposes provided the consumer can
   opt out)
• Daily data can be obtained provided the consumer can opt out
• Half-hourly data can be obtained if the customer opts in

• If the Smart Meter Data is to be used for marketing purposes the
  supplier must obtain explicit consent of the consumer

© Logica 2012. All rights reserved
Smart Meters and Personal Data

Consumer Consent/Objections

Opt in their must be ‘Explicit Consent’ – this is not defined in the DPA
Draft EU Data Protection Regulation states:
• Given expressly
• A freely given and specific and informed indication of the data subjects
  wishes
• Shown by a statement or by a clear affirmative action (could include a tick
  box declaration on a website)
• Silence or inactivity should not indicate consent
• Government has proposed ‘Opt In’ consent should be in writing

For ‘Opt Out’
• Customer must be given clear information of what data will be collected
   and given the clear opportunity to object
• Objection can be made verbally or in writing and supplier will have to
   maintain records to show how they meet these requirements


© Logica 2012. All rights reserved
Smart Meters and Personal Data

Exceptions to Supplier Access Framework

• Supplier has reasonable suspicion that theft is being committed
• Supplier requires information for the purposes of accurate billing
  (for example at change of tenancy/change of supplier/change of
  tariff events)
• To enable the supplier to address customer queries
• Suppliers can access half-hourly data for use in approved trials
  (provided consumer given clear opportunity to opt out)
• Suppliers can access readings at more frequent intervals for pre-
  payment customers as top-ups are made, provided this has been
  explained to the customer




© Logica 2012. All rights reserved
Smart Meters and Personal Data
Third Party Access

Third parties can access Smart Meter Personal Data if:
• Received Direct from the customer
• Consumer has given consent for access via the DCC (third party must be a
   signatory of the Smart Energy Code (SEC)

Third parties must verify the identity of the individual to confirm the correct
person is giving consent to access data
• Where access given by consumer – Third party should check that the
   person giving access is someone in the household i.e. someone who has
   access to the meter
• Where access is given via DCC – possible that a customer identification
   number will be sent to the customer by DCC which the customer forwards
   to the third party. Once received the third party forwards this to the DCC to
   complete the process

ICO will regulate Third Party compliance with the DPA
• May refer to SEC Panel any serious or repeated breaches of Data Protection

© Logica 2012. All rights reserved
Smart Meters and Personal Data

Obligations on Data Processors (Comms/Data Providers)

A29 Working Party – Opinion 12/2011

• Possible communications and data processor providers could be
  data processor only, but if make decisions regarding whether
  personal data can be disclosed to a third party or can be processed
  for new purposes then will be acting as a data controller

European Commission Recommendation – 9.03.2012

• Should take all reasonable steps to ensure that data cannot be
  traced to an individual unless processed in compliance with the
  DPA principles
• As far as possible, data should be rendered anonymous in such a
  way that the individual is no longer identifiable before it is
  processed.
© Logica 2012. All rights reserved
Smart Meters and Personal Data

Key Proposals

Increased Obligations for Processors
• Complex Contractual Obligations
• Maintain Documentation
• Joint and Severable Liability with Data Controller

Data Security Requirements
• Breach Notification ‘without undue delay’

Transborder Data Flows
• Binding Corporate Rules

Consequences of Non-Compliance


© Logica 2012. All rights reserved
Smart Meters and Personal Data

Implications for Smart Metering

Privacy by Design and Default
• Not made accessible to an indefinite number of individuals
• Commission can impose technical standards
• Certification, seals and marks

Privacy Impact Assessments
• Consult with Data Subjects
• Consultation with the supervisory authority




© Logica 2012. All rights reserved
Smart Meters and Personal Data

Key Messages

“Giving consumers informed, meaningful choices about the use of their data is
vital to securing their trust”


“it’s vital people understand why access to their data is needed, and the value
they get by giving their consent”




© Logica 2012. All rights reserved
Smart Meters and Personal Data




                                     Any Questions?




© Logica 2012. All rights reserved
Getting Smart!

Smart Utilities:
Cyber and Infrastructure Security

Alex Baxendale | Security Practice
Assets and Impacts (CIA)


                                                           Tariff


                                      Ind.
                                     Privacy
                                     Privacy


                                                     System
                                                      Data?
                                                                     Meter
                                                                    Readings




                                                 Service
                                                Service
    Meter

                                                                                 Critical
                                                                               Commands
                                                CSP

                                               DSP




© Logica 2012. All rights reserved
Threat Sources
• A number of Threat Sources                                                           Cut Bills
   • With vested interest in compromising
     the service                          Kudos
   • May seek to coerce others
• Various Motivations – Some Shared

  Natural Disaster Strikes                                Hackers        Consumers       Intruders




                                                                                                        A c cide ntal v s D eliberate
                                                                                Direct Motivation
                            CNI
                           Attack                                   DSP Staff


    Terrorists                                    FIS
                                     Spying
    Anarchists
                                                                                              Service
                                                                                               users
                                     Industrial
   Fraud                             Espionage             CSP Staff


                 Organised Crime
                                                                                 Developers

              Good Story

Journalists                                                            Suppliers
                                         Commercial Org

                                Coercion Factors                                 Threat Agents

© Logica 2012. All rights reserved
Threat Vectors
                                     Natural Disaster


          War Dialling
                                            Message
                                         Interception/
                                           tampering
                                                          Interface
                                                           Abuse




                                                            Rogue
                                                         instructions
                                     Intrusion




© Logica 2012. All rights reserved
Security Principles

                                       Clear Governance regime
        Apply
      Strength
                                      Controlled
      in Depth                                          KISS = Strive for Simplicity
                                     Environment

                                        Proportional = Risk based & Fit for Purpose
     Standards Based
                                         Denied by      High TRL            Utilise
                                          Default                          Security
      No Single Point of
                                                           Regular          KPI’s
       Failure (SPOF)
                                                         Independent
                                           Resilient        Audit           Patch
               Least Privilege =                                          Regularly
                Need to have &
                 Need to know                      Security Architecture i.e. SABSA

      Active Management                     Continuous Reassessment
                                               and Improvement
© Logica 2012. All rights reserved
Unique?


                       Mission                                • Analogous threats
                        Critical          High                  exist in other
                         CNI           Assurance
                       Systems          Systems                 sectors
                                                              • These threats are
     Secure                                                     being managed
   Commun-                                                      effectively
    ications
                              Smart
                              Meters           Smart Meters
                                                Foundation
                                                              • Logica is a leader in
                                                               these fields

            Scaled                   Secure
         Architectures               Remote
                                     Devices




© Logica 2012. All rights reserved
Summary

• Its sensitive (CIA) and challenging
• Trust is fundamental
   • Between parties and of consumers!
• Security is ongoing

• Security must be objective, and
   • proportional to risk
• Good governance and standards are essential!
• Applying lessons learned is key




© Logica 2012. All rights reserved
Maintaining the dialogue...




                                              Alex Baxendale
                                              Security Architect

                                              E: alex.baxendale@logica.com




        Logica is a business and technology service company, employing 39,000 people. It provides business consulting,
        systems integration and outsourcing to clients around the world, including many of Europe's largest businesses.
        Logica creates value for clients by successfully integrating people, business and technology. It is committed to long
        term collaboration, applying insight to create innovative answers to clients’ business needs.

        Logica is listed on both the London Stock Exchange and Euronext (Amsterdam) (LSE: LOG; Euronext: LOG).
        More information is available at www.logica.com.
© Logica 2012. All rights reserved
        The company is a public company incorporated and domiciled in the UK.
        The address of its registered office is 250 Brook Drive, Green Park, Reading RG2 6UA, United Kingdom.
Getting Smart!

Smart Utilities:
DCC Data Services Provider |
The Heart of the GB Smart Enabled Energy Market
Tara McGeehan | Director | UK Utilities
The Role of the Data Service Provider
                            Conventional              Smart Data
                            Meter Owner               Processor &
                                                      Aggregator




         Conventional                      Supplier            Smart Data
            Meter                                               Retriever
           Operator

                                           Consumer


         Conventional                                             Smart
        Data Retriever                                          Metering
                                                                 System
                                                                Operator


                           Conventional               Smart Meter
                          Data Processor                Owner
                           & Aggregator

© Logica 2012. All rights reserved
Responsibilities Across the Value Chain
                                          Meter        Comms                                              Decision
                                                                                             DSO                       Smart Grid
      Meter                              Services     Networks                                           Analytics /
                                                                     SI                     MDMS                        Control
 Manufacturers /       Asset         (Installation         /                                                BPM
                                     & Provision)                 Apps Dev   Access
Customer Premises     Funding                         LAN/WAN                                                             Smart
                                     (inc Comms                    Hosting                 Supplier
    Equipment                            Asset          / Data                                             CS&B          Process
                                                       Carriage                             MDMS
                                       Install)                                                                        Management




       Other
       devices                                                                                         Suppliers



       IHD                         Comms
                                                                                      DCC User
                      HAN           Hub
                                                     WAN                              Gateway
                                                                                                       Network
                                                                                                       Operators

       Elec
                                                                                                       Authorised
                                                     CSP            DSP                               Third Parties

       Gas
                                                            DCC

    © Logica 2012. All rights reserved
DECC SMIP Plan (Published 23/12/11)



                                                    Smart rental for SMETS
                                                   compliant meters on CoS




    Service Provider Contract
            Decision

                                                                                Service Provider contract
                                                                                         Award
                                                                     Dumb rental for SMETS        Go-Live of Enduring Smart
                                                                    compliant meters on CoS         Market Arrangements

                                                    Foundation                                                     Enduring
    Q2       Q3       Q4       Q1     Q2     Q3       Q4     Q1     Q2        Q3     Q4     Q1     Q2        Q3     Q4
   2011     2011     2011     2012   2012   2012     2012   2013   2013      2013   2013   2014   2014      2014   2014




                                      Today
© Logica 2012. All rights reserved
DCC Service Provider
Procurement timeline
   Procurement Timetable

        Q4 2011               Q1 2012                Q2 2012                  Q3 2012            Q4 2012                 Q1 2013         Q2 2013



                  PQQ selection


                   Pre-dialogue
                   (ITPD)
                   Discussions only


                                        Outline
                                        Solutions
                                        (ISOS)
                                                           Likely down-select
                                        Bidder
                                        response &
                                        evaluation


                                                               Detailed Solutions (ISDS)
                                                                                                      Likely down-select
                                                               Dialogue, response & evaluation




                                                                                                  Final Tender (ITSFT)
                                                                                                                                   Select
                                                                                                  Dialogue, response &             preferred
                                                                                                  evaluation
                                                                                                                                   bidders


                                                                                                                     Award contracts
                                                                 Today
© Logica 2012. All rights reserved
                                                                                                                                                   No. 6
Our Partnership for the Data Service Provider to DCC
SAP and QinetiQ




   DCC Partnership Video


© Logica 2012. All rights reserved
Maintaining the dialogue...




                                              Tara McGeehan
                                              Director | UK Utilities

                                              M: +44 7899 066 979
                                              E: tara.mcgeehan@logica.com




        Logica is a business and technology service company, employing 39,000 people. It provides business consulting,
        systems integration and outsourcing to clients around the world, including many of Europe's largest businesses.
        Logica creates value for clients by successfully integrating people, business and technology. It is committed to long
        term collaboration, applying insight to create innovative answers to clients’ business needs.

        Logica is listed on both the London Stock Exchange and Euronext (Amsterdam) (LSE: LOG; Euronext: LOG).
        More information is available at www.logica.com.
© Logica 2012. All rights reserved
        The company is a public company incorporated and domiciled in the UK.
        The address of its registered office is 250 Brook Drive, Green Park, Reading RG2 6UA, United Kingdom.

Weitere ähnliche Inhalte

Was ist angesagt?

Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureMelwin Mathew
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000Leo Lukose
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital SignaturesEhtisham Ali
 
Digital Signature
Digital SignatureDigital Signature
Digital SignatureRahul Yadav
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificateAshvini Soni
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2Ankita Dave
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1Khazret Sapenov
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerCheapSSLUSA
 
Digital signatures
Digital signaturesDigital signatures
Digital signaturesIshwar Dayal
 
Advanced redaction whitepaper
Advanced redaction whitepaperAdvanced redaction whitepaper
Advanced redaction whitepaperMark_Miller
 
Digital certificates
Digital certificates Digital certificates
Digital certificates Sheetal Verma
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)Zara Nawaz
 

Was ist angesagt? (20)

Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
D.Silpa
D.SilpaD.Silpa
D.Silpa
 
Certifying authorities rules 2000
Certifying authorities rules 2000Certifying authorities rules 2000
Certifying authorities rules 2000
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
Esign or Electronic Signature
Esign or Electronic SignatureEsign or Electronic Signature
Esign or Electronic Signature
 
Digital signature 2
Digital signature 2Digital signature 2
Digital signature 2
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Advanced redaction whitepaper
Advanced redaction whitepaperAdvanced redaction whitepaper
Advanced redaction whitepaper
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 
Information Security (Digital Signatures)
Information Security (Digital Signatures)Information Security (Digital Signatures)
Information Security (Digital Signatures)
 

Ähnlich wie Analyst briefing session 2 the security challenges

Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Miningwanani181
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkIRJET Journal
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentationVishakha Kumar
 
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...gueste4e93e3
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...DataWorks Summit
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data AnalyticsEMC
 
Cognizant Cloud for Utilities
Cognizant Cloud for UtilitiesCognizant Cloud for Utilities
Cognizant Cloud for UtilitiesSteve Lennon
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessDan Yarmoluk
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...Danny Miller
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchPrompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchIRJET Journal
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 

Ähnlich wie Analyst briefing session 2 the security challenges (20)

180926 ihan webinar 2
180926 ihan webinar 2180926 ihan webinar 2
180926 ihan webinar 2
 
Legal issues in the cloud renzo marchini & gene landy
Legal issues in the cloud   renzo marchini & gene landyLegal issues in the cloud   renzo marchini & gene landy
Legal issues in the cloud renzo marchini & gene landy
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Information Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data MiningInformation Security in Big Data : Privacy and Data Mining
Information Security in Big Data : Privacy and Data Mining
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc NetworkPrivate and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentation
 
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
The Future of Identity in the Cloud: Requirements, Risks and Opportunities - ...
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...Who changed my data? Need for data governance and provenance in a streaming w...
Who changed my data? Need for data governance and provenance in a streaming w...
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Cognizant Cloud for Utilities
Cognizant Cloud for UtilitiesCognizant Cloud for Utilities
Cognizant Cloud for Utilities
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT Process
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Prompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data BrenchPrompt Detection of Transformed Data Brench
Prompt Detection of Transformed Data Brench
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 

Mehr von CGI

Does the cloud have a role in fixing the economy?
Does the cloud have a role in fixing the economy?Does the cloud have a role in fixing the economy?
Does the cloud have a role in fixing the economy?CGI
 
Intelligent Transport System simplified | Logica
Intelligent Transport System simplified | LogicaIntelligent Transport System simplified | Logica
Intelligent Transport System simplified | LogicaCGI
 
Byte Night
Byte NightByte Night
Byte NightCGI
 
Logica, SAP, and Sybase's Innovative Mobile Applications for Anglian Water
Logica, SAP, and Sybase's Innovative Mobile Applications for Anglian Water  Logica, SAP, and Sybase's Innovative Mobile Applications for Anglian Water
Logica, SAP, and Sybase's Innovative Mobile Applications for Anglian Water CGI
 
Designing for privacy
Designing for privacy  Designing for privacy
Designing for privacy CGI
 
Analyst briefing session 3 low carbon london
Analyst briefing session 3   low carbon londonAnalyst briefing session 3   low carbon london
Analyst briefing session 3 low carbon londonCGI
 
Analyst briefing session 1 the challenge of deploying the infrastructure
Analyst briefing session 1   the challenge of deploying the infrastructureAnalyst briefing session 1   the challenge of deploying the infrastructure
Analyst briefing session 1 the challenge of deploying the infrastructureCGI
 
Sustainable Incentives by Melba Foggo
Sustainable Incentives by Melba FoggoSustainable Incentives by Melba Foggo
Sustainable Incentives by Melba FoggoCGI
 
Market Study of Electronic Medical Record (EMR) Systems in Europe
Market Study of Electronic Medical Record (EMR) Systems in EuropeMarket Study of Electronic Medical Record (EMR) Systems in Europe
Market Study of Electronic Medical Record (EMR) Systems in EuropeCGI
 
Read about some of the innovative solutions we offer for better healthcare
Read about some of the innovative solutions we offer for better healthcareRead about some of the innovative solutions we offer for better healthcare
Read about some of the innovative solutions we offer for better healthcareCGI
 
Read Logica’s paper on the need for convergence of healthcare and pharma
Read Logica’s paper on the need for convergence of healthcare and pharmaRead Logica’s paper on the need for convergence of healthcare and pharma
Read Logica’s paper on the need for convergence of healthcare and pharmaCGI
 
Healthcare Challenges and Trends
Healthcare Challenges and TrendsHealthcare Challenges and Trends
Healthcare Challenges and TrendsCGI
 
2012 Testing & Finance conference
 2012 Testing & Finance conference  2012 Testing & Finance conference
2012 Testing & Finance conference CGI
 
ITS for Urban Mobility
ITS for Urban Mobility ITS for Urban Mobility
ITS for Urban Mobility CGI
 
Office of the future
Office of the futureOffice of the future
Office of the futureCGI
 
Clouds are about sharing - Digital London 2012
Clouds are about sharing - Digital London 2012Clouds are about sharing - Digital London 2012
Clouds are about sharing - Digital London 2012CGI
 
Ovum opinion of Logica’s capabilities in utilities industry
Ovum opinion of Logica’s capabilities in utilities industryOvum opinion of Logica’s capabilities in utilities industry
Ovum opinion of Logica’s capabilities in utilities industryCGI
 
Improving people strategy execution through HR outsourcing | Orion Partners
Improving people strategy execution through HR outsourcing | Orion PartnersImproving people strategy execution through HR outsourcing | Orion Partners
Improving people strategy execution through HR outsourcing | Orion PartnersCGI
 
Cloud Expo Europe 2012
Cloud Expo Europe 2012 Cloud Expo Europe 2012
Cloud Expo Europe 2012 CGI
 
Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope CGI
 

Mehr von CGI (20)

Does the cloud have a role in fixing the economy?
Does the cloud have a role in fixing the economy?Does the cloud have a role in fixing the economy?
Does the cloud have a role in fixing the economy?
 
Intelligent Transport System simplified | Logica
Intelligent Transport System simplified | LogicaIntelligent Transport System simplified | Logica
Intelligent Transport System simplified | Logica
 
Byte Night
Byte NightByte Night
Byte Night
 
Logica, SAP, and Sybase's Innovative Mobile Applications for Anglian Water
Logica, SAP, and Sybase's Innovative Mobile Applications for Anglian Water  Logica, SAP, and Sybase's Innovative Mobile Applications for Anglian Water
Logica, SAP, and Sybase's Innovative Mobile Applications for Anglian Water
 
Designing for privacy
Designing for privacy  Designing for privacy
Designing for privacy
 
Analyst briefing session 3 low carbon london
Analyst briefing session 3   low carbon londonAnalyst briefing session 3   low carbon london
Analyst briefing session 3 low carbon london
 
Analyst briefing session 1 the challenge of deploying the infrastructure
Analyst briefing session 1   the challenge of deploying the infrastructureAnalyst briefing session 1   the challenge of deploying the infrastructure
Analyst briefing session 1 the challenge of deploying the infrastructure
 
Sustainable Incentives by Melba Foggo
Sustainable Incentives by Melba FoggoSustainable Incentives by Melba Foggo
Sustainable Incentives by Melba Foggo
 
Market Study of Electronic Medical Record (EMR) Systems in Europe
Market Study of Electronic Medical Record (EMR) Systems in EuropeMarket Study of Electronic Medical Record (EMR) Systems in Europe
Market Study of Electronic Medical Record (EMR) Systems in Europe
 
Read about some of the innovative solutions we offer for better healthcare
Read about some of the innovative solutions we offer for better healthcareRead about some of the innovative solutions we offer for better healthcare
Read about some of the innovative solutions we offer for better healthcare
 
Read Logica’s paper on the need for convergence of healthcare and pharma
Read Logica’s paper on the need for convergence of healthcare and pharmaRead Logica’s paper on the need for convergence of healthcare and pharma
Read Logica’s paper on the need for convergence of healthcare and pharma
 
Healthcare Challenges and Trends
Healthcare Challenges and TrendsHealthcare Challenges and Trends
Healthcare Challenges and Trends
 
2012 Testing & Finance conference
 2012 Testing & Finance conference  2012 Testing & Finance conference
2012 Testing & Finance conference
 
ITS for Urban Mobility
ITS for Urban Mobility ITS for Urban Mobility
ITS for Urban Mobility
 
Office of the future
Office of the futureOffice of the future
Office of the future
 
Clouds are about sharing - Digital London 2012
Clouds are about sharing - Digital London 2012Clouds are about sharing - Digital London 2012
Clouds are about sharing - Digital London 2012
 
Ovum opinion of Logica’s capabilities in utilities industry
Ovum opinion of Logica’s capabilities in utilities industryOvum opinion of Logica’s capabilities in utilities industry
Ovum opinion of Logica’s capabilities in utilities industry
 
Improving people strategy execution through HR outsourcing | Orion Partners
Improving people strategy execution through HR outsourcing | Orion PartnersImproving people strategy execution through HR outsourcing | Orion Partners
Improving people strategy execution through HR outsourcing | Orion Partners
 
Cloud Expo Europe 2012
Cloud Expo Europe 2012 Cloud Expo Europe 2012
Cloud Expo Europe 2012
 
Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope Space to think | Cloud research using Logica futurescope
Space to think | Cloud research using Logica futurescope
 

Kürzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Analyst briefing session 2 the security challenges

  • 1. Agenda DAY 1: 5 July 2012, Kings Place, London Session 2: The Security Challenges 1630-1655 Privacy and Data Security Mark Durrant, Logica 1655-1720 Cyber and Infrastructure Security Alex Baxendale, Logica 1720-1740 DCC Update – The Logica Perspective Tara McGeehan, Logica 1740-1745 Closing Remarks Ana Domingues, Logica 1745-1800 Scott Moorhouse (Olympics) Scott Moorhouse 1800-1900 Informal Networking over drinks © Logica 2012. All rights reserved
  • 2. Getting Smart! Smart Utilities: Smart Metering - Information Security and Data Protection Mark Durrant | Information Security & Data Protection Officer
  • 3. Smart Metering – Where are we now • Technical Specifications have been developed and are to be published • Government recently completed a consultation on data access and privacy which will be used to develop a framework for access to Smart Meter data • Data privacy to be built in to the implementation programme – ‘Privacy by Design’ • Mass roll-out to commence in Q4 2014 © Logica 2012. All rights reserved
  • 4. Smart Meters and Personal Data Following types of Data will be processed • Smart Meter ID Number • Metadata re configuration of meter • Description of message being transmitted (e.g. meter reading/tamper alert) • Date and Time Stamp • Message content (meter readings; alerts; network level information) Personal Data under the Data Protection Act 1998 “…data which relates to a living individual who can be identified from those data, or from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller”. © Logica 2012. All rights reserved
  • 5. Smart Meters and Personal Data Consumer Access Access Smart Meter Data through: • In Home Display (IHD) • HAN (13 months of consumption data) • Monthly Bills from Supplier • On line portals provided by the supplier Supplier System must ensure • Smart Meter Data is only visible to consumer within the home • New occupants cannot view previous occupants Smart Meter Data • Customer has choice as to level of data included in bills • Suppliers must ensure security of portal and customer data can only be accessed by the account holder © Logica 2012. All rights reserved
  • 6. Smart Meters and Personal Data Supplier Access There is a balance to be struck between the granularity of data to ensure the consumer benefits against protecting the consumers personal data The government recommends the framework for Smart Meter Data includes: • Monthly data an be obtained without consent for billing (monthly data can be used for other purposes provided the consumer can opt out) • Daily data can be obtained provided the consumer can opt out • Half-hourly data can be obtained if the customer opts in • If the Smart Meter Data is to be used for marketing purposes the supplier must obtain explicit consent of the consumer © Logica 2012. All rights reserved
  • 7. Smart Meters and Personal Data Consumer Consent/Objections Opt in their must be ‘Explicit Consent’ – this is not defined in the DPA Draft EU Data Protection Regulation states: • Given expressly • A freely given and specific and informed indication of the data subjects wishes • Shown by a statement or by a clear affirmative action (could include a tick box declaration on a website) • Silence or inactivity should not indicate consent • Government has proposed ‘Opt In’ consent should be in writing For ‘Opt Out’ • Customer must be given clear information of what data will be collected and given the clear opportunity to object • Objection can be made verbally or in writing and supplier will have to maintain records to show how they meet these requirements © Logica 2012. All rights reserved
  • 8. Smart Meters and Personal Data Exceptions to Supplier Access Framework • Supplier has reasonable suspicion that theft is being committed • Supplier requires information for the purposes of accurate billing (for example at change of tenancy/change of supplier/change of tariff events) • To enable the supplier to address customer queries • Suppliers can access half-hourly data for use in approved trials (provided consumer given clear opportunity to opt out) • Suppliers can access readings at more frequent intervals for pre- payment customers as top-ups are made, provided this has been explained to the customer © Logica 2012. All rights reserved
  • 9. Smart Meters and Personal Data Third Party Access Third parties can access Smart Meter Personal Data if: • Received Direct from the customer • Consumer has given consent for access via the DCC (third party must be a signatory of the Smart Energy Code (SEC) Third parties must verify the identity of the individual to confirm the correct person is giving consent to access data • Where access given by consumer – Third party should check that the person giving access is someone in the household i.e. someone who has access to the meter • Where access is given via DCC – possible that a customer identification number will be sent to the customer by DCC which the customer forwards to the third party. Once received the third party forwards this to the DCC to complete the process ICO will regulate Third Party compliance with the DPA • May refer to SEC Panel any serious or repeated breaches of Data Protection © Logica 2012. All rights reserved
  • 10. Smart Meters and Personal Data Obligations on Data Processors (Comms/Data Providers) A29 Working Party – Opinion 12/2011 • Possible communications and data processor providers could be data processor only, but if make decisions regarding whether personal data can be disclosed to a third party or can be processed for new purposes then will be acting as a data controller European Commission Recommendation – 9.03.2012 • Should take all reasonable steps to ensure that data cannot be traced to an individual unless processed in compliance with the DPA principles • As far as possible, data should be rendered anonymous in such a way that the individual is no longer identifiable before it is processed. © Logica 2012. All rights reserved
  • 11. Smart Meters and Personal Data Key Proposals Increased Obligations for Processors • Complex Contractual Obligations • Maintain Documentation • Joint and Severable Liability with Data Controller Data Security Requirements • Breach Notification ‘without undue delay’ Transborder Data Flows • Binding Corporate Rules Consequences of Non-Compliance © Logica 2012. All rights reserved
  • 12. Smart Meters and Personal Data Implications for Smart Metering Privacy by Design and Default • Not made accessible to an indefinite number of individuals • Commission can impose technical standards • Certification, seals and marks Privacy Impact Assessments • Consult with Data Subjects • Consultation with the supervisory authority © Logica 2012. All rights reserved
  • 13. Smart Meters and Personal Data Key Messages “Giving consumers informed, meaningful choices about the use of their data is vital to securing their trust” “it’s vital people understand why access to their data is needed, and the value they get by giving their consent” © Logica 2012. All rights reserved
  • 14. Smart Meters and Personal Data Any Questions? © Logica 2012. All rights reserved
  • 15. Getting Smart! Smart Utilities: Cyber and Infrastructure Security Alex Baxendale | Security Practice
  • 16. Assets and Impacts (CIA) Tariff Ind. Privacy Privacy System Data? Meter Readings Service Service Meter Critical Commands CSP DSP © Logica 2012. All rights reserved
  • 17. Threat Sources • A number of Threat Sources Cut Bills • With vested interest in compromising the service Kudos • May seek to coerce others • Various Motivations – Some Shared Natural Disaster Strikes Hackers Consumers Intruders A c cide ntal v s D eliberate Direct Motivation CNI Attack DSP Staff Terrorists FIS Spying Anarchists Service users Industrial Fraud Espionage CSP Staff Organised Crime Developers Good Story Journalists Suppliers Commercial Org Coercion Factors Threat Agents © Logica 2012. All rights reserved
  • 18. Threat Vectors Natural Disaster War Dialling Message Interception/ tampering Interface Abuse Rogue instructions Intrusion © Logica 2012. All rights reserved
  • 19. Security Principles Clear Governance regime Apply Strength Controlled in Depth KISS = Strive for Simplicity Environment Proportional = Risk based & Fit for Purpose Standards Based Denied by High TRL Utilise Default Security No Single Point of Regular KPI’s Failure (SPOF) Independent Resilient Audit Patch Least Privilege = Regularly Need to have & Need to know Security Architecture i.e. SABSA Active Management Continuous Reassessment and Improvement © Logica 2012. All rights reserved
  • 20. Unique? Mission • Analogous threats Critical High exist in other CNI Assurance Systems Systems sectors • These threats are Secure being managed Commun- effectively ications Smart Meters Smart Meters Foundation • Logica is a leader in these fields Scaled Secure Architectures Remote Devices © Logica 2012. All rights reserved
  • 21. Summary • Its sensitive (CIA) and challenging • Trust is fundamental • Between parties and of consumers! • Security is ongoing • Security must be objective, and • proportional to risk • Good governance and standards are essential! • Applying lessons learned is key © Logica 2012. All rights reserved
  • 22. Maintaining the dialogue... Alex Baxendale Security Architect E: alex.baxendale@logica.com Logica is a business and technology service company, employing 39,000 people. It provides business consulting, systems integration and outsourcing to clients around the world, including many of Europe's largest businesses. Logica creates value for clients by successfully integrating people, business and technology. It is committed to long term collaboration, applying insight to create innovative answers to clients’ business needs. Logica is listed on both the London Stock Exchange and Euronext (Amsterdam) (LSE: LOG; Euronext: LOG). More information is available at www.logica.com. © Logica 2012. All rights reserved The company is a public company incorporated and domiciled in the UK. The address of its registered office is 250 Brook Drive, Green Park, Reading RG2 6UA, United Kingdom.
  • 23. Getting Smart! Smart Utilities: DCC Data Services Provider | The Heart of the GB Smart Enabled Energy Market Tara McGeehan | Director | UK Utilities
  • 24. The Role of the Data Service Provider Conventional Smart Data Meter Owner Processor & Aggregator Conventional Supplier Smart Data Meter Retriever Operator Consumer Conventional Smart Data Retriever Metering System Operator Conventional Smart Meter Data Processor Owner & Aggregator © Logica 2012. All rights reserved
  • 25. Responsibilities Across the Value Chain Meter Comms Decision DSO Smart Grid Meter Services Networks Analytics / SI MDMS Control Manufacturers / Asset (Installation / BPM & Provision) Apps Dev Access Customer Premises Funding LAN/WAN Smart (inc Comms Hosting Supplier Equipment Asset / Data CS&B Process Carriage MDMS Install) Management Other devices Suppliers IHD Comms DCC User HAN Hub WAN Gateway Network Operators Elec Authorised CSP DSP Third Parties Gas DCC © Logica 2012. All rights reserved
  • 26. DECC SMIP Plan (Published 23/12/11) Smart rental for SMETS compliant meters on CoS Service Provider Contract Decision Service Provider contract Award Dumb rental for SMETS Go-Live of Enduring Smart compliant meters on CoS Market Arrangements Foundation Enduring Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 2011 2011 2011 2012 2012 2012 2012 2013 2013 2013 2013 2014 2014 2014 2014 Today © Logica 2012. All rights reserved
  • 27. DCC Service Provider Procurement timeline Procurement Timetable Q4 2011 Q1 2012 Q2 2012 Q3 2012 Q4 2012 Q1 2013 Q2 2013 PQQ selection Pre-dialogue (ITPD) Discussions only Outline Solutions (ISOS) Likely down-select Bidder response & evaluation Detailed Solutions (ISDS) Likely down-select Dialogue, response & evaluation Final Tender (ITSFT) Select Dialogue, response & preferred evaluation bidders Award contracts Today © Logica 2012. All rights reserved No. 6
  • 28. Our Partnership for the Data Service Provider to DCC SAP and QinetiQ DCC Partnership Video © Logica 2012. All rights reserved
  • 29. Maintaining the dialogue... Tara McGeehan Director | UK Utilities M: +44 7899 066 979 E: tara.mcgeehan@logica.com Logica is a business and technology service company, employing 39,000 people. It provides business consulting, systems integration and outsourcing to clients around the world, including many of Europe's largest businesses. Logica creates value for clients by successfully integrating people, business and technology. It is committed to long term collaboration, applying insight to create innovative answers to clients’ business needs. Logica is listed on both the London Stock Exchange and Euronext (Amsterdam) (LSE: LOG; Euronext: LOG). More information is available at www.logica.com. © Logica 2012. All rights reserved The company is a public company incorporated and domiciled in the UK. The address of its registered office is 250 Brook Drive, Green Park, Reading RG2 6UA, United Kingdom.