AMP 2019-2029

Electricity Asset Management Plan 2019-2029

70

Vector Limited://

with the defined data owners to ensure that business (i.e. operational) and governance requirements are met for each data set. The data stewards are trained and overseen by the Enterprise Information Manager.

The Group Information Governance Council has responsibility for setting and enforcing the Group Data & Information policy. This includes being the escalation point for data related events and conflict. Importantly the council is made up of the core disciplines and functions from across the business that impact on privacy and data management including, but not limited to, the Privacy Officer, Cyber Security, Digital Architecture, Information Management and Data & Analytics. The council reports directly to our Chief Executive Officer. Operationally, the electricity business maintains a dedicated Networks Information Management team to perform the majority of the data activities as depicted in the box titled “Operations – Information Management”. This team is responsible for defining and ensuring the implementation of data standards, as well as managing the data within the System of Record for asset, asset performance, geo-spatial and customer data. In addition, the team also manages regulatory reporting (including one off requests) as well as managing other third party data requests such as location information and asset information.

Figure 3-9 Data and Information Management model

3.10 CYBER SECURITY & PRIVACY In the context of our Asset Management Plan, our strategic intent in regards to cyber security is focused on addressing two key risks: The protection of critical network assets from unauthorised access that could result in disruptions to service/physical damage Safeguarding and restricting access to any personal/customer data that is used for network management purposes Effectively managing these risks requires the implementation of a combination of technical, process and behavioural controls that will allow us to quickly detect, respond and recover from potential cyber security threats. The security threats, the nature of network assets and the volume of data required to manage the network is constantly evolving. This requires continual re-assessment of the effectiveness of the risk and the corresponding controls. In this environment, balancing resilience and security provides both challenges and opportunities. These challenges are not new – resiliency and security have always been cornerstone principles of how we deliver our services. However, as the network becomes more open in terms of protocols, communication channels and technologies, and the perimeter of the

Made with FlippingBook - professional solution for displaying marketing and sales documents online