Owner of the document requires that the content be not remodified or redistributed.
Share |



B3: Utility Detects Tampering or Theft at Customer Site
Abstract:

A serious threat to utilities is theft of services. There is also a large liability potential if tampering remains undetected. This scenario describes the process by which the utility detects tamper/theft through communication with the meter. It includes the methods by which the communication equipment detects the tampering/theft. Tamper methods include, for example, comparison of the load profile data against historical records, or a spontaneous report of a tamper switch being triggered at the customer site. This scenario excludes the actual reading of data required to support a determination of theft/tamper detection. This is covered by scenario B1. It also excludes the actual algorithms used to determine whether theft is occurring.

Year Published:
2006
Source:
Southern California Edison
Use Case Library:
Click here