WHITE PAPER. Distribution Substation Outage Investigations. Overview. Introduction. By Ahmad Shahsiah, Ph.D., P.E. March 2018
|
|
- Gertrude Powers
- 5 years ago
- Views:
Transcription
1 WHITE PAPER Distribution Substation Outage Investigations By Ahmad Shahsiah, Ph.D., P.E. March 2018 Overview Electrical distribution systems in the United States served approximately 152 million customers in i A large portion of the electricity delivered by the utility companies is generated in power plants, brought to main distribution hubs, and then distributed to the utility customers from the central hubs known as distribution substations. Therefore, if a distribution substation is lost due to a major failure, service to a large number of customers can be disrupted. Major failures such as these are rare, but when they occur, post-failure investigations of the events are of paramount importance to reduce the likelihood of such incidents from happening again. The investigations should include not only the technical aspects of the failures but also the organizational factors contributing to the failures. Suggested corrective actions should also be outlined and discussed. This article is an overview of components of such types of investigations with reference to a substation outage that occurred in a large metropolitan area in the United States. The outage resulted in the loss of tens of thousands of customers for multiple hours. The Exponent investigative team was dispatched to the incident scene the same day and started the investigations immediately. Exponent performed a thorough investigation related to the root cause and other contributing factors including the emergency response and customer restoration time after the incident. The Exponent report in this case outlined the findings, discussed contributing factors, and recommended corrective actions, all of which were implemented. Introduction Electrical substations incorporate redundancies and have automated protection systems to increase safety and minimize customer outage in case of a failure. Several protection layers, known as protection zones, are monitored by automatic protective devices that can isolate sections of a substation and its feeders within a fraction of a second if a failure occurs. These systems help to minimize the number of the customers lost in case of the failure of one section. Some of the substation designs include automatic load transfer to the operating sections of a substation in case of the failure of other sections. Sophisticated protection and load transfer schemes are also programmed into the protection system to ensure reliable transfer of loads and to minimize the total duration of outages.
2 For the reasons mentioned above, electrical substations are highly reliable, and outage events are relatively rare. However, equipment failures do occur within substations that result in the loss of power to the substation. These events usually include multiple failures leading to the substation outage. More often than not, there are opportunities to detect the initial failures and prevent them from cascading to a major event leading to the loss of the substation. Study of past failures provides valuable lessons to prevent future similar events. However, two major substation failures are rarely identical. The failures are also usually unique to the substations and their components. This makes the study of the organizational and operational barriers against total substation loss important. Therefore, after analyzing the substation failure incidents, an important part of the lessons learned is to identify gaps in the organizational and operational procedures that could lead to such failures. Methodology The recommended causal assessment methodology is a structured approach for causal analysis and consists of the following five steps: 1. Data Collection 2. Reconstruction of Problem Scenarios 3. Performance of Causal Analysis a. Direct cause b. Root cause 4. Review of Restorations and Extent of Condition 5. Development of Recommended Actions to Prevent Recurrence These steps are described below. Data Collection Data collection is performed through site inspections, review of event-related documents, digitally recorded data, recorded voice conversations, public records, and interviews. The collected data includes the digitally recorded data at the time of the incident by the digital protection and the Supervisory Control and Data Acquisition (SCADA) system or Distributed Control System (DCS). Important information is typically available to be collected at early stages following an incident; therefore, it is important that the investigative team be at the site of the incident as soon as possible. The investigative team at the site typically interviews the available personnel, collects data, and photographically documents the substation condition. Following the initial site visit, the investigative team needs continued access to the site for follow up data collection and personnel interviews. Exponent performed numerous site inspections in the case of the above-mentioned substation investigation during the months following the incident. During those site visits important data were collected regarding the configuration of different systems and during the removal and replacement of the failed components. All removed components were tagged as evidence and preserved. Later inspection and testing of those components provided valuable clues about the cause of the incident.
3 Of particular importance during the substation failure investigation was the inspection of the hardware of the protection and SCADA systems. This was to ensure that they operated as intended. Subsequent interviews of the personnel who either witnessed the failure, or were knowledgeable about the substation operational and historical problems, helped in determining the direct cause of the failure. In addition, collected information was not limited to the events leading to the incident; it also included the reactions after the incident and the restoration process to evaluate the effectiveness of recovery. Publically available information about the incident were also included in the data collection process as part of the investigation. This included media reports, police and fire department reports, personal cell phone photos, and information posted on social media. Reconstruction of Problem Scenarios As a result of the data collection activities, Exponent developed an event timeline during the substation investigation to identify the relative timing of events for use in evaluating the events. The detailed timeline included the emergency actions after the incident until the restoration was complete. The timeline was constructed using all available data, including SCADA logs, audio recordings, phone records, cell phone photographs following the incident, security camera footage, badge reader logs, the station logbook, fire alarm panel logs, the fire department s Computer-aided dispatch (CAD), and the fire department s radio recordings. Performance of Causal Analysis There are different known methods of causal analysis for determining root causes. Causal analysis is not limited to the technical aspects of the failure, herein referred to as the direct cause. It also includes other factors such as processes, policies, human factors, and organizational factors. A commonly used method is the Events and Causal Factors Analysis (ECFA) approach. Exponent used this method to identify potential systemic incident causes (e.g., management policies and organization) for each initiating event during the substation failure investigations. It involved repeatedly asking why the event or precondition existed and providing evidence to support the why, in order to identify the underlying causes. The outcome of the above causal analyses was the identification of the causes including the technical cause. This information formed the basis for developing recommended corrective actions. Causal Analysis Direct Cause The direct cause of the failure is the technical reason for the failure, such as failing equipment or a malfunctioning protection device. The direct cause does not include other factors such as processes, policies, human factors, and organizational factors. An engineering review of the collected data after the incident is important to determine the direct cause of the incident. This usually involves review of the digitally collected data as well as the system protection targets. The direct cause analysis also requires understanding the system design. Often the investigative team has to review technical documents such as the station one-line and direct current (DC) diagrams to fully understand the extent of the conditions leading to the incident and to interpret the collected data. The direct cause should include not only the review of relevant electrical and protection designs but also the actual installations and their consistency with the designs and their intended function. This may include inspecting relevant control wires in the substation, since in some of the older installations, wiring and equipment age and wear could be a contributing factor. The investigative team can potentially perform tests on the DC
4 control system to ensure correct functionality of the system; although, such tests after the incident in an active substation may be difficult and may require coordination with the distribution control center. The direct cause of the incident is identified when the underlying technical cause of the incident is determined. The underlying technical cause must explain all the available evidences including the digitally collected data. Causal Analysis Root Cause The causal analysis was performed using a methodology similar to the direct cause analysis; however, the process was not limited to the technical aspects leading to the incident. The potential systemic causes and contributing factors included process, policies, human factors, and organizational factors for each initiating event. Causal analysis charts are important tools that were used to identify the underlying causes of the incident in a structured way. Restorations and Extent of Condition The investigative team also performed analysis of the response after the incident including the emergency actions and restorations. As the substation failure involved a fire, important lessons were learned to improve effectiveness of the substation crew response and coordination with the fire department. This analysis revealed gaps in the utility s fire response procedure and personnel training regarding following procedures in case of a substations fire. It also revealed gaps in the coordination and training with the first responders. Suggested corrective actions were applicable to the other substations as well. Review for Extent of Condition and Extent of Cause An outcome of the causal analysis was to identify the potential for a condition or cause to exist elsewhere, which could lead to a similar failure. During this review, it was important to consider what other events would occur as a result of similar organizational or management factors. Development of Recommended Actions to Prevent Recurrence The desired outcome of causal analysis is to identify recommended corrective actions to prevent recurrence of the problem and to identify lessons learned. Effective corrective actions are those that address the causes, are implementable by the organization, and are consistent with company business goals and strategies. All of the Exponent recommendations in the abovementioned substation failure case were implemented. Conclusion Electrical substation failures are rare events, but when they occur, they need to be thoroughly investigated. Important information can be lost if the causal investigation is limited to the technical aspects of the failure or the direct cause. Other contributing factors such as human factors, policies, and organizational factors should also be included in the causal analysis. Investigative teams should have access to the site to conduct the investigations as soon as possible after the incident. Investigative teams should also have unrestricted access to relevant design documentations of the substations and site access during the replacement of the failed units for site inspections and personnel interviews. A structured approach is
5 suggested in this article consisting of several steps. The process involves repeatedly asking why the initiating event existed and providing evidence for each why in order to identify the underlying causes. Exponent Team Exponent consultants have comprehensive expertise in the planning, construction, operation, and maintenance of traditional utility systems and their components and newly emergent technologies reshaping the industry. We apply this knowledge to solve complex problems such as substation failures. Exponent has performed several substation failure investigations. Our team responded to the substation outage discussed here on the same day. Investigations continued for several months, and the final report included recommended corrective actions after identifying the underlying causes. i e=linechart<ype=pin&rtype=s&maptype=0&rse=0&pin= (Last accessed 9 January 2018).
A Strong Response Before, During and After. Hurricane Sandy. West Penn Power, Penelec and Met-Ed
A Strong Response Before, During and After Hurricane Sandy West Penn Power, Penelec and Met-Ed January 10, 2013 FirstEnergy s Presence in Pennsylvania Erie Towanda New Castle Easton Greensburg Johnstown
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 10 Chapter X Security Performance Metrics Background For many years now, NERC and the electricity industry have taken actions to address cyber and physical
More informationREGIONAL UTILITY COORDINATION PLAN. Portland, Oregon / Vancouver, Washington Metropolitan Area
REGIONAL UTILITY COORDINATION PLAN Portland, Oregon / Vancouver, Washington Metropolitan Area I. PURPOSE The purpose of this plan is to outline procedures for coordination between local governments and
More informationSecurity and Disaster Preparedness: New York s Experience. Presented by: New York Department of Public Service. December 7, James T.
Security and Disaster Preparedness: New York s Experience Presented by: James T. Gallagher New York Department of Public Service james_gallagher@dps.state.ny.us December 7, 2001 Rome, Italy 1 Security
More informationChapter X Security Performance Metrics
Chapter X Security Performance Metrics Page 1 of 9 Chapter X Security Performance Metrics Background For the past two years, the State of Reliability report has included a chapter for security performance
More informationStandard Development Timeline
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard is adopted by the NERC Board of Trustees (Board).
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationAfter the Attack. Business Continuity. Planning and Testing Steps. Disaster Recovery. Business Impact Analysis (BIA) Succession Planning
After the Attack Business Continuity Week 6 Part 2 Staying in Business Disaster Recovery Planning and Testing Steps Business continuity is a organization s ability to maintain operations after a disruptive
More informationNATURAL AWARENESS TRACKING SCHOOL, LLC STANDARD 7400
NATURAL AWARENESS TRACKING SCHOOL, LLC STANDARD 7400 TYPE 3 - OPERATIONAL TRACKER Speiden, et al This is based on the final document submitted to and approved by the Virginia Search and Rescue Council
More informationDRAFT Risks and Mitigations for Losing EMS Functions
DRAFT Risks and Mitigations for Losing EMS Functions 1.0 Executive Summary Energy Management System (EMS) is a system of computer-aided tools used by System Operators to monitor, control, and optimize
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationIncident Response Services to Help You Prepare for and Quickly Respond to Security Incidents
Services to Help You Prepare for and Quickly Respond to Security Incidents The Challenge The threat landscape is always evolving and adversaries are getting harder to detect; and with that, cyber risk
More informationUF CEMP Support Group Annex: IT Group
UF CEMP Support Group Annex: IT Group Lead Representatives Office of Vice President and Chief Information Officer (CIO) Supporting Departments External Partners Academic Technology Computing and Networking
More informationBUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW
BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW EXECUTIVE SUMMARY CenturyLink is committed to ensuring business resiliency and survivability during an incident or business disruption. Our Corporate Business
More informationCIP Cyber Security Configuration Management and Vulnerability Assessments
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationChapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS
Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS The Saskatchewan Power Corporation (SaskPower) is the principal supplier of power in Saskatchewan with its mission to deliver power
More informationSubstation SCADA Monitoring
Substation SCADA Monitoring Contact us Today for a FREE quotation to deliver this course at your company?s location. https://www.electricityforum.com/onsite-training-rfq Substations are a critical component
More informationUF CEMP Support Group Annex: Public Safety
UF CEMP Support Group Annex: Public Safety Lead Representatives University of Supporting Departments External Partners Enrollment Management Shands Hospital Safety & Security Alachua County Emergency Management
More informationCIP Cyber Security Recovery Plans for BES Cyber Systems
Standard Development Timeline This section is maintained by the drafting team during the development of the standard and will be removed when the standard becomes effective. Development Steps Completed
More informationManaging Hazards and Incidents Managers, Supervisors and SHR Guide
1.1. Introduction This guide is for Managers, Supervisors and Safety and Health Representatives to help navigate the functions used to manage hazards and incidents in your role as a Manger, Supervisor
More informationIncident Response Services
Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and
More informationSCADA Software. 3.1 SCADA communication architectures SCADA system
3 SCADA Software 3.1 SCADA communication architectures 3.1.1 SCADA system A supervisory control and data acquisition (SCADA) system means a system consisting of a number of remote terminal units (RTUs)
More informationCIP Cyber Security Recovery Plans for BES Cyber Systems
A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-6 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan
More informationSapphire Wind Farm 330/33kV Substation
Signature projects: Projects: Project Edison AusNet Sapphire Wind Farm 330/33kV Substation TransGrid Zinfra constructed 330/33kV substation and transmission line as part of the cut in works for the Sapphire
More informationLoss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014
Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP-009-3 September 30, 2014 James Williams Lead Compliance Specialist jwilliams.re@spp.org 501.614.3261 Jeremy Withers Senior Compliance Specialist
More informationCITY OF WINSTON-SALEM, NORTH CAROLINA Public Safety Needs Assessment Study Phase One EXECUTIVE SUMMARY
EXECUTIVE SUMMARY I. Documentation and Current Conditions Establishment Process II. Existing Public Safety Facilities Analysis III. Space Allocation, Co-Location and Potential Site Location Analysis IV.
More information(JSA) Job Safety Analysis Program. Safety Manual. 1.0 Purpose. 2.0 Scope. 3.0 Regulatory References. 4.0 Policy
Page 1 of 7 1.0 Purpose Job Safety Analysis is a primary element of the Hazard Identification and Mitigation Management Process. JSA s are completed daily to identify and evaluate hazards associated with
More informationBCP At Bangkok Bank, Thailand
BCP At Bangkok Bank, Thailand Bhakorn Vanuptikul, BCCE Executive Vice President Bangkok Bank Public Company Limited 10 May 2012 1 Agenda Business Continuity Management at Bangkok Bank Success Factors in
More informationFlorida Power & Light Company Hurricane Response Update. Eric Silagy President and CEO Florida Power & Light Company
Florida Power & Light Company Hurricane Response Update Eric Silagy President and CEO Florida Power & Light Company 35 counties Serving more than half of Florida 4.9 million customer accounts Majority
More informationCHART BOOK: HAND-HELD MOBILE DEVICE USE TRENDS FOR MISSISSIPPI ADULTS
CHART BOOK: HAND-HELD MOBILE DEVICE USE TRENDS FOR MISSISSIPPI ADULTS March 2018 Overview issue brief HAND-HELD MOBILE DEVICE USE WHILE DRIVING Policy Considerations in Mississippi Published december 2017
More informationWashington Metropolitan Area Transit Authority Board Action/Information Summary
Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: Resolution: Yes No TITLE: Incident Customer Communications PURPOSE: To provide an update
More informationAuditing in an Automated Environment: Appendix E: System Design, Development, and Maintenance
Accountability Modules Auditing in an Automated Environment: Agency Prepared By Initials Date Reviewed By Audit Program - System Design, Development, and Maintenance W/P Ref Page 1 of 1 Procedures Initials
More informationStandard TOP Transmission Operations
A. Introduction 1. Title: Transmission Operations 2. Number: TOP-001-34 3. Purpose: To prevent instability, uncontrolled separation, or Cascading outages that adversely impact the reliability of the Interconnection
More informationToronto Hydro Response to December 2013 Ice Storm Independent Review Panel Report
Toronto Hydro Response to December 2013 Ice Storm Independent Review Panel Report Media Briefing Toronto, ON June 18, 2014 Part 1: Introduction David McFadden Chair, Independent Review Panel 3 Independent
More informationHow AlienVault ICS SIEM Supports Compliance with CFATS
How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal
More information2010 HURRICANE SEASON PREPARATION BRIEFING
2010 HURRICANE SEASON PREPARATION BRIEFING PSC Workshop May 17, 2010 Barbara Quinones, Director City of Homestead, Homestead Energy Services Today s Presentation System Overview Hurricane Experience Storm
More informationHalifax Regional Municipality
Halifax Regional Municipality Challenge Leverage existing IT infrastructure to design a high-definition surveillance system that helps protect corporate assets across the Halifax Regional Municipality
More informationOEMC 2016 Budget Statement of Executive Director Gary W. Schenkel to the Committee on Budget and Operations September 30, 2015
OEMC 2016 Budget Statement of Executive Director Gary W. Schenkel to the Committee on Budget and Operations September 30, 2015 Good morning, Chairman Austin, Vice Chairman Ervin and members of the City
More informationWashington Metropolitan Area Transit Authority Board Action/Information Summary
Washington Metropolitan Area Transit Authority Board Action/Information Summary Action Information MEAD Number: 201697 Resolution: Yes No TITLE: MTPD Security Updates PRESENTATION SUMMARY: The Metro Transit
More informationDistributed Control Systems (DCS)
Training Title Distributed Control Systems (DCS) Training Duration 5 days Training Venue and Dates Distributed Control Systems (DCS) 5 13-17 May $3,300 Abu Dhabi In any of the 5 star hotel. The exact venue
More informationUse of Personal Mobile Phone Whilst on Duty
Use of Personal Mobile Phone Whilst on Duty (Incorporating Smartphones and Hand Held Devices) Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland
More informationHealth Facilities and Utility Providers
Health Facilities and Utility Providers Strengthening the Partnership Ann Steeves, CEO HC-EMI November 2017 National Healthcare Coalition Preparedness Conference 2017 HC-EMI. All rights reserved. 1 Learning
More informationInformation Security Incident
Good Practice Guide Author: A Heathcote Date: 22/05/2017 Version: 1.0 Copyright 2017 Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body
More informationFDA 483 The Definitive Guide to Responding to FDA 483 and Warning Letters
FDA 483! The Definitive Guide to Responding to FDA 483 and Warning Letters Jon Speer Founder & VP of QA/RA greenlight.guru Table of Contents 1 Introduction 2 What Is an FDA 483 Observation? 3 Know Who
More informationLFI Learning from Incidents
LFI Learning from Incidents 1 Current State Good systems with analysis exist Generally good culture of reporting Areas for Enhancement Not shared between organizations Safety culture could further encourage
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationNational Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015
National Preparedness System (NPS) Kathleen Fox, Acting Assistant Administrator National Preparedness Directorate, FEMA April 27, 2015 The Post Katrina Emergency Management Reform Act (2006) Required the
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationThe Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction
29 February 2016 The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction 2015-2030 The Sendai Framework for Disaster Risk Reduction 2015-2030
More informationIntroduction to UKAS Accreditation Fire Scene Development Programme. David Compton November 2017
Introduction to UKAS Accreditation Fire Scene Development Programme David Compton November 2017 What is UKAS Accreditation? Procedure by which an authoritative body gives formal recognition that a body
More informationFRAMEWORK FOR CYBER INCIDENT RESPONSE TRAINING
Safety and Security Engineering VII 273 FRAMEWORK FOR CYBER INCIDENT RESPONSE TRAINING HIDEKAZU HIRAI, TOMOMI AOYAMA, DAVAADORJ NYAMBAYAR & ICHIRO KOSHIJIMA Industrial Management Engineering, Nagoya Institute
More informationArizona State Troopers Highway Patrol Division Sergeant John Paul Cartier
Arizona State Troopers Highway Patrol Division Sergeant John Paul Cartier Average Annual Number of Responders Struck and Killed Nationally 12 Law Enforcement Officers 5 Fire and Rescue Personnel 60 Towing
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationResponse to Wood Buffalo Wildfire KPMG Report. Alberta Municipal Affairs
Response to Wood Buffalo Wildfire KPMG Report Alberta Municipal Affairs Background To ensure continuous enhancement and improvement of Alberta s public safety system, the Alberta Emergency Management Agency
More informationTelecommunications Network Reliability
Telecommunications Network Reliability Office of Telecommunications NYS Department of Public Service Background Major Outages in 1999, 2000, and 2001 9/11 Telecommunications Severely Disrupted Infrastructure
More informationPerspectives from the U.S. Federal Communications Commission: Lessons Learned on ICTs in Disaster Prevention and Relief
Perspectives from the U.S. Federal Communications Commission: Lessons Learned on ICTs in Disaster Prevention and Relief Thomas Sullivan International Bureau Federal Communications Commission July 2012
More informationVolt/VAR Control Options and How to Leverage AMI Data
By Tom Helmer, Executive Consultant and Joseph Sottnik, P.E., Project Manager, Black & Veatch Published in the August 2012 issue of PowerGrid International Energy efficiency and operational optimization
More informationNext Generation Emergency Communications Intelligent Migration
2010 Texas NENA Conference Next Generation Emergency Communications Intelligent Migration A Well-Managed Path from Enhanced 9-1-1 to Integrated Next Generation 9-1-1 Services Mart D. Nelson Consulting
More informationKEDS DSO Development Plan. George Karagutoff, KEDS CEO Prishtina, Kosovo 20 March, 2018
KEDS DSO Development Plan George Karagutoff, KEDS CEO Prishtina, Kosovo 20 March, 2018 1 INVESTMENTS AT A GLANCE KEDS begun its operations after the successful unbundling of Distribution and Supply business
More informationPOLICE QUICK REPORTING SYSTEM (PQRS)
POLICE QUICK REPORTING SYSTEM (PQRS) PROJECT REFERENCE NO. : 37S1140 COLLEGE : ADICHUNCHANAGIRI INSTITUTE OF TECHNOLOGY, CHIKAMAGALUR BRANCH : COMPUTER SCIENCE AND ENGINEERING GUIDES : DARSHAN L.M STUDENTS
More informationWireless LAN Example Scenario
CHAPTER 5 The wireless LAN relies on high-speed wireless hot spots. Unlike public hot spots which have begun to appear in airports, hotel lobbies, and coffee shops, allowing anyone with a wireless-enabled
More informationCIP Cyber Security Recovery Plans for BES Cyber Systems
A. Introduction 1. Title: Cyber Security Recovery Plans for BES Cyber Systems 2. Number: CIP-009-5 3. Purpose: To recover reliability functions performed by BES Cyber Systems by specifying recovery plan
More informationProcess Definition: Security Services
Process Definition: Services 1. SUMMARY Process Definition: Services 1.1. This document defines the processes provided by the Services team in detail. 1.2. The relationship between this Business Unit process
More informationComputer Security Incident Response Plan. Date of Approval: 23-FEB-2014
Computer Security Incident Response Plan Name of Approver: Mary Ann Blair Date of Approval: 23-FEB-2014 Date of Review: 31-MAY-2016 Effective Date: 23-FEB-2014 Name of Reviewer: John Lerchey Table of Contents
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationThe Missouri Department of Transportation, in cooperation with its regional partners Illinois Department of Transportation, Metro and East West
The Future of St. Louis Intelligent Transportation The ITS Heart Of St. Louis The Missouri Department of Transportation, in cooperation with its regional partners Illinois Department of Transportation,
More informationOn-Officer Body Camera Program
1 of 7 1. PURPOSE This order establishes the Mesa Police (MPD) operational and submission guidelines for the "On-Officer" Body Camera (OBC) Pilot, which will be implemented for one year ending October
More informationSkills Academy. Forensic Studies Courses
Skills Academy Forensic Studies Courses www.skillsacademy.co.za Forensic Science Programmes Forensic Science Studies is for the person who wants to work in a laboratory or as a crime scene technician and
More informationINFORMATION SECURITY- DISASTER RECOVERY
Information Technology Services Administrative Regulation ITS-AR-1505 INFORMATION SECURITY- DISASTER RECOVERY 1.0 Purpose and Scope The objective of this Administrative Regulation is to outline the strategy
More informationENGINEERING AND SERVICES FIRM THAT SPECIALIZES IN HYDROELECTRIC POWER AND CONTROL SYSTEM DESIGN, OUR TEAM OF PROFESSIONALS HAVE WORKED TOGETHER
smallhydro PRIME ENGINEERING LIMITED IS AN ELECTRICAL ENGINEERING AND SERVICES FIRM THAT SPECIALIZES IN HYDROELECTRIC POWER AND CONTROL SYSTEM DESIGN, IMPLEMENTATION AND MAINTENANCE. OUR TEAM OF PROFESSIONALS
More informationJSC THE JUSTICE & SAFETY CENTER. Snapshot 2014
JSC THE JUSTICE & SAFETY CENTER Snapshot 2014 The Justice & Safety Center (JSC) is comprised of a team of faculty and staff professionals at Eastern Kentucky University (EKU) dedicated to strengthening
More informationII. Investigative Methodology
I. Introduction 1. Indicate the date and time the incident allegedly occurred, if known. 2. Indicate time the incident was reported to facility personnel. 3. List name(s) of the person(s) reporting the
More informationFEMA Update. Tim Greten Technological Hazards Division Deputy Director. NREP April 2017
FEMA Update Tim Greten Technological Hazards Division Deputy Director NREP April 2017 FEMA Strategic Priorities Priority 1: Be survivor-centric in mission and program delivery. Priority 2: Become an expeditionary
More informationChapter 2 State Estimation and Visualization
Chapter 2 State Estimation and Visualization One obvious application of GPS-synchronized measurements is the dynamic monitoring of the operating conditions of the system or the dynamic state estimation
More informationM E M O R A N D U M. Summary
M E M O R A N D U M EUGENE WATER & ELECTRIC BOARD TO: FROM: Commissioners Helgeson, Brown, Mital, Simpson and Carlson Rod Price, Chief Engineering & Operations Officer Rene González, Customer Solutions
More informationHIPAA RISK ADVISOR SAMPLE REPORT
HIPAA RISK ADVISOR SAMPLE REPORT HIPAA Security Analysis Report The most tangible part of any annual security risk assessment is the final report of findings and recommendations. It s important to have
More informationDemand management Policy
Demand management Policy Policy summary This policy provides guidance on all aspects of demand management from taking of the initial call to the completion of tasks following attendance at incidents. Aim
More informationBUSINESS CONTINUITY AND DISASTER RECOVERY POLICY
BUSINESS CONTINUITY AND DISASTER RECOVERY POLICY Manual OCTOBER 2, 2016 CHILDREN IN FREEDOM (CIF) CIF P.O.Box 25286-00100, Kenya, Africa, NY, USA (c) 2016 Page 1 Contents ACKNOWLEDGEMENT... 0 1.0 STATEMENT...
More informationSurvalentONE Distribution Management System
SurvalentONE Distribution Management System Analyze & Optimize Critical Grid Functions for Advanced System Monitoring & Control SurvalentONE ADMS The SurvalentONE ADMS platform is a fully integrated SCADA,
More informationprimary Control Center, for the exchange of Real-time data with its Balancing
A. Introduction 1. Title: Reliability Coordination Monitoring and Analysis 2. Number: IRO-002-5 3. Purpose: To provide System Operators with the capabilities necessary to monitor and analyze data needed
More informationIndustry Standards Utilities Engineering Technician
Industry Standards Utilities Engineering Technician Utilities engineering technicians create and test technological equipment for consumer and commercial use. In the utilities industry, engineering technicians
More informationModels 300, 310, 320, 330 PROTECTIVE AND SUPERVISION STORAGE CABINET FOR AUTOMATED EXTERNAL DEFIBRILLATORS (AED)
Models 300, 310, 320, 330 PROTECTIVE AND SUPERVISION STORAGE CABINET FOR AUTOMATED EXTERNAL DEFIBRILLATORS (AED) PUBLIC ACCESS DEFIBRILLATION (PAD) PROGRAMS CRA (Cardio-Respiratory Arrest) more commonly
More informationApril Appendix 3. IA System Security. Sida 1 (8)
IA System Security Sida 1 (8) Table of Contents 1 Introduction... 3 2 Regulatory documents... 3 3 Organisation... 3 4 Personnel security... 3 5 Asset management... 4 6 Access control... 4 6.1 Within AFA
More informationKansas City s Metropolitan Emergency Information System (MEIS)
Information- Sharing Interagency Cooperation Resources Management Law Enforcement Fire Emergency Medical Services Public Health Private Sector Kansas City s Metropolitan Emergency Information System (MEIS)
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More informationCCM APPLICATION FORM
CCM APPLICATION FORM You must: 1. Complete all of the information required in sections 1.1 to 1.6 of this form 2. Read, sign and date the declaration in section 1.3 and 1.6 3. Attach one passport sized
More informationPECO 2013 Summer Readiness Overview June 28, 2013
PECO June 28, 2013 Summer is here and PECO is ready. PECO bases its readiness on its reliability enhancement programs, preventative maintenance programs, and capacity planning. In addition, PECO initiated
More informationRedundancy Concepts. INTRON-D plus. Single System with N+1 Components Duplicated Control System (hot stand-by operation) A+B System (shared operation)
Redundancy Concepts INTRON-D plus Single System with N+1 Components Duplicated Control System (hot stand-by operation) A+B System (shared operation) THE ENGINEERS OF COMMUNICATION Optimum Protection -
More informationImplementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities
Implementation Plan for Newly Identified Critical Cyber Assets and Newly Registered Entities This Implementation Plan applies to Cyber Security Standards CIP-002-2 through CIP-009-2 and CIP-002-3 through
More informationOverview of PECO s Distribution Integrity Management Plan
Overview of PECO s Distribution Integrity Management Plan PUC Gas Safety Seminar September 8, 2016 David Bonner, PE Robert Ridgeway, PE Agenda PECO Distribution System Overview DIMP Pillar #1 DIMP DIMP
More informationDISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK
DISTRICT OF COLUMBIA WATER AND SEWER AUTHORITY ATTACHMENT A A-1: BACKGROUND AND CONTRACTOR QUALIFICATIONS A-2: SCOPE OF WORK GOODS AND SERVICES CONTRACTS Page 1 of 5 RFP 16-PR-DEM-33 Comprehensive All-Hazards
More informationFEATURES & BENEFITS. Key word search function both inside and outside projects. Intuitive application makes creating profiles quick and easy
R2S Forensic provides R2S software and media support capabilities that assist in effective law enforcement, criminal investigation and public protection. We work with police forces, legal bodies, government
More informationStandard EOP Disturbance Reporting
A. Introduction 1. Title: Disturbance Reporting 2. Number: EOP-004-1 3. Purpose: Disturbances or unusual occurrences that jeopardize the operation of the Bulk Electric System, or result in system equipment
More informationNUKG Business Solutions Pvt Ltd. Information Security Incident Management Procedure (IS-IMG)
NUKG Business Solutions Pvt Ltd Information Security Incident Management Procedure (IS-IMG) Version No 1.0 Document Classification Prepared by Vasu Reviewed by Ravi Kanduri Approved by Ravi Kanduri Date
More informationRailroad Infrastructure Security
TRB Annual Meeting January 14, 2002 Session 107 - Railroad Security William C. Thompson william.thompson@jacobs.com 402-697-5011 Thanks to: Bob Ulrich Dr. William Harris Byron Ratcliff Frank Thigpen John
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Title: Certified Digital Forensics Examiner Duration: 5 days Class Format Options: Instructor-led classroom Live Online Training Prerequisites: A minimum of
More informationSymantec Data Center Migration Service
Avoid unplanned downtime to critical business applications while controlling your costs and schedule The Symantec Data Center Migration Service helps you manage the risks and complexity of a migration
More informationVERTIV SERVICE CAPABILITY
VERTIV SERVICE CAPABILITY VERTIV SERVICE CAPABILITY Service Offering Manage the health of your entire critical infrastructure with a service partner who can offer you business continuity. Exactly the level
More informationCertification. Forensic Certification Management Board. Robert J. Garrett, Director
Certification Forensic Certification Management Board Robert J. Garrett, Director Crime Lab Accreditation and Certification Essentials National Clearinghouse for Science, Technology, and the Law What is
More information