Theft: Information sharing

Slides:



Advertisements
Similar presentations
Lesson 10 Financial Plan Text Book: Barringer B. and Ireland D. Entrepreneurship: Successfully Launching New Ventures 4th edition, Pearson Higher Education.
Advertisements

Copper Theft Update Mayor and Council May 22, 2012.
CEVP ® Cost Estimate Validation Process TEA Conference 2004 Jay Drye, P.E. Assistant State Design Engineer Monica Bielenberg, P.E. CREM Program Manager.
Problem Management Overview
Project Planning: Even More Important with Web 2.0 Tom Laughner Jo CannonCarlson.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
P274 – National Revenue Protection Service. 2 Principles of X-industry gas theft service The impact on the participants will be revenue neutral (no supplier.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
MOD506 – Gas Performance Assurance Framework and Governance Arrangements.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
October 2002J. B. Wordsworth: J2ISDQR11 Information Systems Development Quality and Risk (1)
 Polar Move  Polar Activity measurement  E600  Computer  PE Manager Software.
1) Establish & Identify Scheme 5) Evolve Scheme 4) Review & Modify Scheme Deliverables 3) Operate the Framework 2) Manage Performance Assurance Scheme.
Theft: Best practice 15 th June Best practice should extend across the process Investigation and detection. Data collection. Reconnection. These.
Central Revenue Protection Unit David Watson 12 th October 2009.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Assessing a New Venture’s Financial Strength and Viability
Current and New process Current Process New Process Response: Does not want service but live supply -Passed into Orphaned Report Intends to confirm – Remains.
Continual Service Improvement Methods & Techniques.
1 /13 Risk Management What is Risk ?. 2 /13 Risk Management What is Risk ? Risk is the possibility of suffering loss. (Carnegie Mellon SEI definition)
25/04/2012 No Profit Europe SURVEY RESULTS ON C.S.R IN GREECE.
1 MIS 2008/2009 Software Project - Group 1 Activity Monitoring Tool 08-quality/ Quality-plan/ Change-control-plan/ Progress-reports/ Templates/ index.htm.
Group 5 Introducing an Impact Orientation: Institutions IFAD Workshop on Impact Achievement.
Vision and Values Strategic Plan Business Plan 90 Day Plan- Service line I 90 Day Plan- Service line II 90 Day Plan- Service line III 90 Day Plan- Service.
Draft Modification Proposal: Population and Maintenance of Market Sector Code within Sites & Meters Simon Trivella –26 th November 2009 Distribution Workstream.
Theft of Energy ElectraLink – 03 August 2016 An Overview of The Theft Risk Assessment Service (TRAS) and Energy Theft Tip Off Service (ETTOS)
MGMT 452 Corporate Social Responsibility
7. Modular and structured design
Short Term Rentals Workgroup
David Addison / Steve Deery
Introduction to ‘Insights to Behavior’
Theft Detection Incentives
Modifications iGT 039 and GT 0440 re iGT Agency Services background
Quality of government expenditure
Performance Assurance Framework Risk Register Consultation Summary
Investment Intentions Survey 2016
Self-Assessment How many times, during the course of your IRS career, have you prepared a self-assessment and shared it with your manager as part of the.
xoserve relocation to 31 Homer Road Solihull
Skills needed to become a Good Software Engineer
Allocation of Unidentified Gas Statement - Update
ITPD ISSUE MANAGEMENT PROCESS SEPTEMBER 5, 2008
Monitoring and Assessment Assignment
Network management system
Gathering Information: Monitoring your Progress
Meter Status Table Providing timely opening reads is an obligation to the confirming shippers. However where the confirming shipper fails to meet this.
Strategic Planning Summary.
بسم الله الرحمن الرحیم فرآیند رسیدگی به شکایات
Gathering Information: Monitoring your Progress
Gas Performance Assurance
Theft on Shipper-less Sites
Background MDD is currently managed within SPAA
CoMC on 20th February 2019 For Discussion Only
Registry Design Pattern
xoserve Theft of Gas Team
Theft: Shipperless Arrangements
Faculty of Industrial Management CONCLUSIONS AND RECOMMENDATION
UNC Modification Performance Assurance Framework Incentive Regime
Release 2 Baselined Customer Training Requirements
Review Group 208 / Development Modification Group 194
Performance Assurance Framework (‘PAF’):
Implementation Approach Distribution Workgroup – June 2014
Assessment Day Strategy
Title I and Wagner-Peyser Act Waiver Requirements and Request Process
xoserve Services XOSERVE SCOPE Sites Register Maintenance Shipper
Pay for Performance Project support overview Presenter's Name
Customer Issue Management CoMC Update
Action: RG b -Theft of gas Workshop
Customer Issue Management CoMC Update for June 2019
Asset Management Plan Development and Implementation Support
Cascading Strategic Objectives – Hoshin Planning Template
Presentation transcript:

Theft: Information sharing 18th May 2009

Information collection and provision can be a major tool in tackling theft Supporting proactive theft strategies. Knowing what kind of theft is occurring where can help target resource. Sharing data on what works can help us all get better value from theft detection. Tracking the impact of initiatives. Providing a snapshot of detections, allowing industry performance to be measured. Transparency on who is doing what. Ability to see who has detected what and when.

Key data items should be collected… Who has made the detection. Where the detection took place. The type of theft detected. When the detection was made. Assessed value of the theft detected. Stolen meters register. Meter details. Where it was found. When it was found.

…collated and shared. Data should be passed to network owners and collated. The data should then be made available to all shippers so that it may inform their proactive theft strategies. This will achieve the removal of reliance on reactive methods – making theft detection more cost effective.

Governance Code of Practice? Where should the provisions sit; SPAA?