23.03.2013 Views

FortisBC Inc. (FortisBC) Application for a Certificate of Public ...

FortisBC Inc. (FortisBC) Application for a Certificate of Public ...

FortisBC Inc. (FortisBC) Application for a Certificate of Public ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8<br />

9<br />

10<br />

11<br />

12<br />

13<br />

14<br />

15<br />

16<br />

17<br />

18<br />

19<br />

20<br />

21<br />

22<br />

23<br />

24<br />

25<br />

26<br />

27<br />

28<br />

29<br />

Response:<br />

<strong>FortisBC</strong> <strong>Inc</strong>. (<strong>FortisBC</strong> or the Company)<br />

<strong>Application</strong> <strong>for</strong> a <strong>Certificate</strong> <strong>of</strong> <strong>Public</strong> Convenience and Necessity<br />

<strong>for</strong> the Advanced Metering Infrastructure Project<br />

Response to British Columbia Utilities Commission (BCUC or the Commission)<br />

In<strong>for</strong>mation Request (IR) No. 1<br />

35.3 Explain the security provided to protect the data.<br />

Submission Date:<br />

October 5, 2012<br />

Page 62<br />

The MDMS application is protected behind firewalls within the <strong>FortisBC</strong> corporate network. Data<br />

transmission uses SSL 128bit encryption <strong>for</strong> all communications.<br />

Role-based security will be used which will ensure only authenticated users have access to the<br />

system. Additionally, users will be assigned to roles or security groups that will limit the<br />

functions they can per<strong>for</strong>m or data they are authorized to view.<br />

Versioning <strong>of</strong> data will also be maintained within the MDMS and audit logs kept in order to have<br />

the ability to identify changes that have been made, by which user and why.<br />

Response:<br />

35.4 Explain the algorithms used in the VEE process and why the backfilling <strong>of</strong><br />

missing data is required.<br />

Despite the robust communications network that would be established as part <strong>of</strong> the proposed<br />

AMI deployment, the transmission <strong>of</strong> some hourly data will inevitably be delayed and some data<br />

may be faulty. Validation routines flag potentially faulty data. In instances <strong>of</strong> incomplete data,<br />

estimating algorithms attempt to fill in the missing data. If automated algorithms fail, the VEE<br />

process allows <strong>for</strong> manual editing <strong>of</strong> the hourly data.<br />

Using validation, estimation and editing (VEE), the data is quickly and accurately verified and if<br />

needed, amended, making it available <strong>for</strong> billing, operational and other uses by the utility.<br />

Backfilling <strong>of</strong> missing data may be required:<br />

• To ensure that clean and complete data can be delivered to utility systems;<br />

• To ensure the data quality <strong>of</strong> assets (<strong>for</strong> example, by using the Message Sum Check<br />

algorithm to compare the sum <strong>of</strong> the intervals to the difference in register reads);<br />

• To ensure complete data <strong>for</strong> Web presentment to customers; and<br />

• To ensure that billing can proceed accurately.<br />

A Message Sum Check algorithm is a critical process in the ef<strong>for</strong>t to provide data <strong>for</strong> billing<br />

processes that meet the needs <strong>for</strong> verification and reconciliation. Upon the receipt <strong>of</strong> the AMI

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!