Five security principles

We have defined five security principles which we always use as starting points when we develop solutions. The principles make sure that the solutions comply with the requirements and that data is managed confidentially. 

Data encryption

All metering devices have individual encryption keys to protect data
from meter to collection unit and from collection unit to server. These
must not be transferred via plain text in emails, USB keys or the like.
Therefore, we have methods for exchanging encryption keys with our
customers in a safe way, so that encryption keys will not fall into the
wrong hands. 

Storage and decryption of data happen solely behind firewalls and in
the data management system to ensure the data security required by
the legislation.

Role-based access

Data security is not only a technical matter. It is also about internal processes.
Among others, this means that there is a difference between who needs to see
and handle which data in the system and when to do so. Because of this, our
systems make it easy to handle roles and rights and perform the necessary
restrictions required for you to comply with the GDPR.

Logging of activities

An important element of data security is the human factor – because
no chain is stronger than its weakest link. This is why activity logs and
traceability in our solutions ensure full transparency so that you know
exactly which user has done what and at what time. In this way, you
can at always live up to your documentation responsibility. 

Multiple layers of Security

Our systems have several layers of functions and controls that increase the security.
Hereby a potential security breach can be isolated to a single part of or component
in the system, because several security layers have been built in between the single
layers. This minimises potential damages.

Contingency plan

We always try to keep ahead of IT criminals. If a security breach
should occur anyway, we have a contingency plan for ensuring
that both you and we are quickly up and running again. This implies
a number of clear steps for how we detect security breaches, clarify
the scale of the incident and contact the people who may be affected.
In that way, you can rest assure that we are always prepared. 

We use cookies both to ensure our website works properly and to collect statistics about users in order for us to improve the website. You accept the use of cookies by continuing to browse the site or by closing this banner. Read more.