Meter Tampering Presentation American Electric Power Texas Central Company Texas North Company.

Slides:



Advertisements
Similar presentations
School Food Service Locking Bank Bags. PROTECT THE CASH AND YOURSELF! The cafeteria manager is responsible and liable for all missing cash and checks.
Advertisements

Why Plan Ahead? Limit Susceptibility Limit Risk Contain Material Loss Contain Human Impact Limit Down-Time Ensure Longevity FEMA Fact: 80% of businesses.
Barhale Procedure for Site Establishment
Revenue Protection & Safety Field Safety. Safety First Section 1.5 Personal Protective Equipment.
Life with AMR Strengths and Weaknesses Of AMR Systems.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
The Control of Hazardous Energy
Carrollton, Texas Police Department Community Problem Oriented Policing Team: Reducing Vehicle Burglaries.
Social Context of Computing Chapter 7. Digital Divide  Technological inequalities  Impact of communication technologies  Radio  Television  Press.
Stray Current Investigations A Method of Troubleshooting Stray Current on Underground Residential Distribution (URD) Loops Stacey Mighty Malcolm Distribution.
Property Management Overview
Revenue Protection Process Options with Relation to Smart Meters.
Personal Injury Investigation and Transportation Claims Presented by FARA Risk Control Services on behalf of ORM.
SDReaderCE An Overview on Use and Functionality. Using SDReaderCE After loading the route to the handheld from SDReader6, select the route folder from.
Interpret Technical Drawing & Plans
1 Department of Water and Power City of Los Angeles Automatic Meter Infrastructure Program Mariko Marianes and John Yu.
The laws Organizations are covered by lots of different laws
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Management of Health And Safety.
ACCIDENT INVESTIGATION. Accident Investigation An Employer should immediately investigate the cause of any accident or other incident that : çresulted.
1 Billing, Metering CRM/CIS America 2004 Transition Strategy: Manual Field Data Collection to AMR Implementation Chuck Session Manager, Cinergy Meter Reading.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Introduction Save-bees’ Anti Theft Device helps professional beekeepers to locate their hives in cases of theft or unexpected relocations. It can inform.
Section 54’s 54.Inspector’s power to deal with dangerous conditions – (1) if an inspector has reason to believe that any occurrence, practice or condition.
Evacuation Units Training [school’s name here]. Evacuation Policy When a threat comes in, it is assessed by our Threat Assessment Team. The Team then.
1CUL.PPT Last Revised: 10 June 2003 The Role of the Communications Unit Leader Developed as part of the National Emergency Services Curriculum Project.
ERCOT MARKET EDUCATION
1 Revenue Recovery How to make more money that’s already yours (SCE) Presented by: Robert Montoya September 2009.
Mobile Audio/Video Recording Equipment Policy and Procedure Number PP
Administrator – Employee Overview September, 2011.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
DN Emergency Procedures – Theft of Gas Simon Trivella –15 th June 2009 Review Group 0245 – Theft of Gas arrangements.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Hazard Communication Presentation Presented by: Western Assurance Corp Desert Utility & Paving, LLC and Century Club Construction, LLC Design © 2005, 2012.
ERCOT MARKET EDUCATION Retail 101. Introductions, Roles and Responsibilities.
Federal Motor Carrier Safety Administration Commercial Enforcement and Investigations Division Complaint Handling Moving Fraud Meeting November 14, 2012.
Theft: Best practice 15 th June Best practice should extend across the process Investigation and detection. Data collection. Reconnection. These.
Cleve L. Freeman – Los Angeles, CA USA Energy Loss Reduction Programs & Profits, Rio de Janeiro, Brazil 11 – 13 August 2004.
1. 2 Hazard Assessment 3 Your accident rates or injury rates will be reduced by being pro-active in Hazard Assessment.
MNM Fatal Other (Drowning) Other (Drowning) December 10, 2013 (Kentucky) December 10, 2013 (Kentucky) Sand & Gravel Mine Sand & Gravel Mine Dredge.
Crime Scene Investigation. Basic Premise The actions taken at the onset of an investigation are vitally important to the successful resolution of the.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
Cctv Management Solution - CMS From – Intelitech Solutions Pvt. Limited. [ ITSPL Group ]
Division of Risk Management State of Florida Loss Prevention Program.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
Basic Lockout Guidelines
Roles and Responsibilities Explain the roles and responsibilities for health and safety of key personnel in selected workplace.
Advanced AMR Utilizing a Radio Mesh Network In Rural Electric Cooperatives Matthew Ryan Advanced AMR
RA 7832 and its IRR (Anti-Electricity Pilferage Law)
S V.MOUNICA 09551A0294.  To increase the distribution rate of present electric supply which is 70% to 100%.  Improving the supply to house holds without.
Lock out / Tag Out The Control of Hazardous Energy.
All About Workplace Electrical Safety
A cross functional team was formed to review the current revenue protection process, the potential impact due to the implementation of Smart Metering.
GROUP SECURITY INVESTIGATIONS. 2016/06/212 Drive down the instances of energy crime against Eskom by means of effective prevention, investigation and.
Request Proposal. Proposal Request Process The Proposal Request Process has been included in the online “Forms” with the purpose of: - Speeding up the.
Risk Based Thinking in Health & Safety
UGA Extension Credit Card Processing Training
The Misplaced Meters Case
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Election Security Best Practices
Struggling to Pull the Plug on Energy Theft with AMR Technology
John Kratzinger Jim Roscovich
Meter removal and installation certification
PSE&G Credit and Collection
FOOD DEFENSE TRAINING Brigiotta’s Farmland Produce & Garden Center, Inc.
Meter removal and installation certification
Presentation transcript:

Meter Tampering Presentation American Electric Power Texas Central Company Texas North Company

PROCESS DEALING WITH METER TAMPERING Discover tampering –Sources of Leads Field employees/Meter Readers Inversion/removal reports 30% drop report Zero usage Report Broken Seal Report Call Center/anonymous tips Law Enforcement REPs/CRs Landlords

PROCESS DEALING WITH METER TAMPERING Employee is sent to the location of the suspected tampering to investigate. Employee checks enclosure seal. If enclosure seal is cut/missing, meter is removed and the wire connections and meter seal are checked. If tampering is discovered, the Revenue Protection Coordinator is contacted to coordinate gathering the evidence

PROCESS DEALING WITH METER TAMPERING Revenue Protection Coordinator ensures: Photographs are taken, Physical evidence is secured, The enclosure is left in a safe condition, Proper charges are assessed against the customer.

NUMBER OF PERSONNEL ASSIGNED TO ENERGY THEFT All field employees are trained to detect and have responsibility for helping to identify tampering 4 full time Revenue Protection Coordinators strategically located throughout AEP Texas

CHANGES MADE IN THE LAST YEAR Within the last year, AEP has not made any substantive changes as to how it detects and investigates tampering. The only changes made have been in what and how to make the evidence available to the REPs.

NUMBER OF TAMPERING INCIDENTS YearTCCTNCTOTAL YTD

BACKBILLING STATISTICS—2008 NUMBER OF MONTHS BACKBILLED 1-3 Months22% 4-6 Months40% 7-12 Months65% Months80% **Only 20% of the tampering cases involve back-billing for more than 18 months

BACKBILLING STATISTICS—2009 NUMBER OF MONTHS BACKBILLED 1-3 Months25% 4-6 Months47% 7-12 Months73% Months86% **Only 14% of the tampering cases involve back-billing for more than 18 months

METER READ STATISTICS Number of meters read per day –AEP Texas reads an average of 61,186 meter per day. Some are manually read, some are read with AMR mobile collectors and some are read through a power line carrier

METER READ STATISTICS Number of meters read per day/per meter reader –The average meters physically read each day by meter readers is 274. The actual reads per day can vary from 100 to 400 depending on rural or urban routes.

METER READ STATISTICS Do meter readers have instant communications with the meter theft team at the TDU? –Typically, Meter readers make notations in the hand-held processor. Their data is then produced in reports that are reviewed for required action. If there is a dangerous or hazardous condition, the Meter Reader may be able to communicate with cell phone or company radio.

METER READ STATISTICS When discovered, how promptly is the investigation started? –All incidences of meter tampering are investigated as soon as possible. –If it is a field service employee that makes the discovery, they investigate while at the location. –If it is discovered by a Meter Reader, he will use a coding system in his hand-held processor that initiates an investigative order once the data is uploaded into the computer system at night. –If a noted hazard is reported, it is investigated immediately.

METER READ STATISTICS When is the meter replaced? –The meter is replaced for a number of reasons if there is physical damage to the meter: Hole in the glass, Broken inner seal, Tampered potential link, Inserted resistor, Customer installed switch inside the meter, When there is evidence that a stolen meter is also being used at the premise.

METER READ STATISTICS Where does the old meter go? –AEP Texas places the meter in a secure evidence locker accessible only by our revenue protection coordinator.

METER READ STATISTICS How long do you keep the old meter? –The meter is kept for 3 years Do the meter readers have cameras? –No. Meter readers do not have a camera, but the specialists that follow-up on the investigation of suspected tampering do have cameras.

AGGREGATE $ AMOUNT CHARGED TO REP 2008 –Backbilling Total Backbilling$185,509 Unrecoverable $80,533 Total Value of Tampering$266,042 –Meter tampering fees and related charges $378,823.35

AGGREGATE $ AMOUNT CHARGED TO REP 2009 YTD –Backbilling Total Backbilling$157,348 Unrecoverable $47,026 Total Value of Tampering $204,374 –Meter tampering fees and related charges $452,128.74