Owner of the document requires that the content be not remodified or redistributed.
Share |



Assessment of Technology Used to Protect the Privacy of Energy Usage Data
Author:
EPRI
Year:
2012
Abstract:

This report focuses on privacy and does not include system security, which, when unrelated to privacy, is not in scope. It does not address such topics as securing commands to meters, gathering information that does not risk privacy, protecting availability of the meter and power.
The report provides an overview of:
- Introduction to privacy
- AMI architecture
- Guidance on AMI privacy
- Common AMI use cases that impact privacy
- Privacy-related research and technology

Document Type:
Report
Source:
EPRI