AMP 2019-2029

Electricity Asset Management Plan 2019-2029

227

Vector Limited://

decisions and continue to place a heavy reliance on data specialists for insight generation Invest in advanced, predictive and pro-active analytics tools, alongside development of advanced algorithms and methods. This will enable Vector to optimise response, provide insights to support decision making, proactively identify potential areas of weakness and continue to deliver services to Vector’s customers.

Option 2: Data Management & Utilisation program

$5.1M Selected

PROPOSED INVESTMENT SUMMARY ($MILLION NOMINAL)

DESCRIPTION

FY20

FY21

FY22

FY23

FY24

FY25

FY26

FY27

FY28

FY29 TOTAL

Data Management and Utilisation

0.73

0.40

0.42

0.44

0.46

0.48

0.51

0.53

0.54

0.59

5.10

Total CAPEX

0.73

0.40

0.42

0.44

0.46

0.48

0.51

0.53

0.54

0.59

5.10

END USER COMPUTE & COLLABORATION

NEEDS STATEMENT All businesses are now heavily reliant on end user computing and collaboration between parties. The ability to access the internet, send and receive emails, utilise word processing, data capture and note taking mechanisms on multiple devices is an expectation of all employees and stakeholders. Further, there is an increasing expectation on the ability of employees to collaborate, engage and share documents, content and collateral in a simple and easy to use fashion. Today, we provide employees with laptop, desktop and some mobile devices, alongside supporting ‘bring your own device (BYOD) using corporate identity management and security platforms. End user computing investment is focussed on ensuring the lifecycle of employee devices is actively managed, employees are equipped with devices that are fit for purpose, and all employees have access to the tools, systems and capabilities they need to complete their jobs. The collaboration between employees is supported by Microsoft enterprise platforms, including SharePoint, and a significant amount of investment in collaboration will be made in this period to further enhance these capabilities, improve the security of devices and provide access to authenticated third parties for relevant information.

TARGETED OUTCOMES

CUSTOMER EXPERIENCE

SAFETY

RELIABILITY

RESILIENCE

OPERATIONAL EFFICIENCY

CYBER SECURITY AND PRIVACY

OPTIONS CONSIDERED Options to address the need identified above have been assessed and are summarised in the following table.

DESCRIPTION

DISCUSSION OF OPTION

ESTIMATED COST (NPV IF APPLICABLE)

STATUS

Option 1: Business as usual

Run all end user devices through end of life and only replace essential items when they are failing. No investment in collaboration or access management will lead to sensitive information being improperly stored, transferred and distributed Continue to keep employee devices up to date across lifecycle. Provide secure, stable and easy to use collaboration capabilities. Increase penetration of BYOD devices alongside the increased security capabilities, providing employees with choices as to what they use and how, and reducing the overall demand on device management for the core IT functions.

Rejected

Option 2: End User compute & collaboration program

$23.2M Selected

Made with FlippingBook - professional solution for displaying marketing and sales documents online