Five security principles

We have defined five security principles which we always use as starting points when we develop solutions. The principles make sure that the solutions comply with the requirements and that data is managed confidentially. 

 
 

Data encryption

All metering devices have individual encryption keys to protect data from meter to collection unit and from collection unit to server. These must not be transferred via plain text in emails, USB keys or the like. Therefore, we have methods for exchanging encryption keys with our customers in a safe way, so that encryption keys will not fall into the wrong hands.

Storage and decryption of data happen solely behind firewalls and in the data management system to ensure the data security required by the legislation.

Role-based access

Data security is not only a technical matter. It is also about internal processes. Among others, this means that there is a difference between who needs to see and handle which data in the system and when to do so. Because of this, our systems make it easy to handle roles and rights and perform the necessary restrictions required for you to comply with the GDPR.

Logging of activities

An important element of data security is the human factor – because no chain is stronger than its weakest link. This is why activity logs and traceability in our solutions ensure full transparency so that you know exactly which user has done what and at what time. In this way, you can at always live up to your documentation responsibility.

Multiple layers of Security

Our systems have several layers of functions and controls that increase the security. Hereby a potential security breach can be isolated to a single part of or component in the system, because several security layers have been built in between the single layers. This minimises potential damages.

Contingency plan

We always try to keep ahead of IT criminals. If a security breach should occur anyway, we have a contingency plan for ensuring that both you and we are quickly up and running again. This implies a number of clear steps for how we detect security breaches, clarify the scale of the incident and contact the people who may be affected. In that way, you can rest assure that we are always prepared.