Muutke küpsiste eelistusi

Data Privacy for the Smart Grid [Pehme köide]

, (Rebecca Herold, LLC, Van Meter, Iowa, USA)
  • Formaat: Paperback / softback, 252 pages, kõrgus x laius: 234x156 mm, kaal: 367 g
  • Ilmumisaeg: 19-Sep-2019
  • Kirjastus: CRC Press
  • ISBN-10: 0367377829
  • ISBN-13: 9780367377823
  • Formaat: Paperback / softback, 252 pages, kõrgus x laius: 234x156 mm, kaal: 367 g
  • Ilmumisaeg: 19-Sep-2019
  • Kirjastus: CRC Press
  • ISBN-10: 0367377829
  • ISBN-13: 9780367377823

Many Smart Grid books include "privacy" in their title, but only touch on privacy, with most of the discussion focusing on cybersecurity. Filling this knowledge gap, Data Privacy for the Smart Grid provides a clear description of the Smart Grid ecosystem, presents practical guidance about its privacy risks, and details the actions required to protect data generated by Smart Grid technologies. It addresses privacy in electric, natural gas, and water grids and supplies two different perspectives of the topic—one from a Smart Grid expert and another from a privacy and information security expert.

The authors have extensive experience with utilities and leading the U.S. government’s National Institute of Standards and Technologies (NIST) Cyber Security Working Group (CSWG)/Smart Grid Interoperability Group (SGIP) Privacy Subgroup. This comprehensive book is understandable for all those involved in the Smart Grid. The authors detail the facts about Smart Grid privacy so readers can separate truth from myth about Smart Grid privacy.

While considering privacy in the Smart Grid, the book also examines the data created by Smart Grid technologies and machine-to-machine (M2M) applications and associated legal issues.

The text details guidelines based on the Organization for Economic Cooperation and Development Privacy Guidelines and the U.S. Federal Trade Commission Fair Information Practices. It includes privacy training recommendations and references to additional Smart Grid privacy resources.

After reading the book, readers will be prepared to develop informed opinions, establish fact-based decisions, make meaningful contributions to Smart Grid legislation and policies, and to build technologies to preserve and protect privacy. Policy makers; Smart Grid and M2M product and service developers; utility customer and privacy resources; and other service providers and resources are primary beneficiaries of the information provided in

Preface xi
Acknowledgments xvii
About the Authors xix
Chapter 1 The Smart Grid and Privacy
1(10)
What Is the Smart Grid?
1(1)
Changes from Traditional Energy Delivery
1(1)
Smart Grid Possibilities
2(1)
Business Model Transformations
3(1)
Emerging Privacy Risks
4(1)
The Need for Privacy Policies
5(1)
Privacy Laws, Regulations, and Standards
5(2)
Privacy-Enhancing Technologies
7(1)
New Privacy Challenges
8(3)
IOT
8(1)
Big Data
9(2)
Chapter 2 What Is the Smart Grid?
11(32)
Market and Regulatory Overview
11(25)
Traditional Electricity Business Sector
11(1)
The Electricity Open Market
12(1)
Classifications of Utilities
13(1)
Rate-Making Processes
14(1)
Electricity Consumers
15(1)
Electricity Technology Overview
16(1)
Electricity Supply Chain Vulnerabilities
17(1)
The Smart Grid
18(1)
Market Changes in the Smart Grid
19(2)
Prosumer Evolution
21(1)
Other Relevant Market Changes
21(2)
Buildings as Prosumers
23(2)
Automated Demand Response and the OpenADR Initiative
25(1)
Microgrids
26(2)
The Future Smart Grid
28(1)
Technology Changes
28(1)
Energy Storage
29(1)
Transmission Grids
30(2)
Data Volumes within the Smart Grid
32(1)
Data Owners, Data Custodians, and Data Managers
33(2)
Energy Consumption
35(1)
Smart Grid Privacy Risk Examples
36(3)
Energy Regulation
39(1)
Smart Grid, Smart Infrastructure
39(2)
Key Points for Smart Grid Technologies
41(2)
Chapter 3 What Is Privacy?
43(12)
What Is Privacy?
43(1)
Categories of Privacy
44(1)
What's the Difference between Security and Privacy?
45(2)
Data Types
47(2)
Smart Data Privacy Implications
49(2)
Data Communications Privacy Concerns
51(4)
Chapter 4 Smart Meter Data and Privacy
55(20)
Meter Comparisons
55(2)
AMR Metering
57(1)
Smart Meters Overview
58(2)
Signaling Types
60(1)
Smart Meter Communications Capabilities
61(2)
Smart Meter Data Read Frequency
63(1)
Smart Meter Data Granularity
63(3)
Energy Savings Initiatives
66(1)
Green Button Initiative
66(3)
Green Button Connect
69(2)
AMI Networks
71(2)
Smart Meter Data Summary
73(2)
Chapter 5 The Connected Home
75(22)
Home Area Networks
75(3)
Communications Options
78(1)
Home Energy Management Systems
79(1)
HEMS Adoption
80(1)
HEMS Communications with the Smart Grid
81(3)
HANs Do Not Need Smart Meters
84(1)
HANs as Communications Gateway Devices
84(1)
Privacy Risks within Rentals and Other Leased Spaces
85(2)
Employee Privacy Risks within Commercial Buildings and Industrial Sites
87(1)
Disaggregation Technologies
88(2)
Hardware
88(1)
Software
89(1)
Smart Appliances
90(1)
Connecting Home Appliances
91(2)
DR Programs
93(4)
Chapter 6 Electric Vehicles, Charging Stations, and Privacy
97(14)
Publicly Owned Charging
99(5)
Private Charging
104(2)
Utility-Supplied Network Charging
106(1)
Other Privacy Implications with EVs
106(2)
Telematics
108(3)
Chapter 7 Mitigating Privacy Risks
111(34)
Basic Risk Mitigation Strategies
111(1)
Smart Grid Privacy Risks
112(1)
Energy Usage Data Privacy Risks
112(8)
Energy Production Data Privacy Risks
120(1)
Identifying Risks
121(1)
Privacy Risk Mitigation Methods
122(23)
Chapter 8 How to Take Charge of Your Privacy
145(20)
Roles and Responsibilities
145(4)
Privacy Possibilities and Responsibilities for the Data Subject
149(3)
Data Subject Privacy Use Case Example
152(1)
Information Security Controls to Support Privacy Protection
152(6)
Privacy Responsibilities for the Data Controller/Data Custodian and the Data Processor/Data Manager
158(1)
Other Helpful Privacy and Information Security Resources
158(7)
Chapter 9 Transactive Energy
165(18)
Technology
166(2)
Microgrids
168(1)
Regulatory Policy
169(2)
Finance
171(7)
OpenADR
178(1)
Going Forward
179(4)
Chapter 10 Addressing Common Privacy Claims
183(6)
Chapter 11 Beyond the Smart Grid: The Monetization of Data
189(8)
Sensor Proliferation
190(7)
Appendix A Smart Grid Categories and Associated Privacy Risks 197(6)
Appendix B Example of One State's Actions for Smart Grid Privacy 203(4)
Index 207
Rebecca Herold has over two and a half decades of information privacy, security, and compliance expertise. Rebecca is CEO of Privacy Professor® and owner/partner for SIMBUS® and has led the NIST SGIP Smart Grid Privacy Group since June 2009. She has been an adjunct professor for the Norwich University MSISA program since 2005 and has written 17 books and hundreds of published articles. Rebecca is invited to speak at a wide variety of events throughout the United States, and other worldwide locations such as Melbourne, Australia, Bogotá, Colombia, and Ireland.

Rebecca is widely recognized and respected, and has been providing information privacy, security, and compliance services, tools, and products to organizations in an extensive range of industries for over two decades. Just a few of her awards and recognitions include the following:



















Named in the Top Two Female Infosec Leaders to Follow on Twitter in 2014 by Information Security Buzz





Named to the ISACA International Privacy Task Force in 2013





Named on Tripwires list of InfoSecs Rising Stars and Hidden Gems: The Top 15 Educators in July 2013





Named one of Information Security Buzzs list of Top 5 Female Infosec Leaders to Follow on Twitter in 2013 and 2014





Has been named one of the "Best Privacy Advisers in the World" multiple times in recent years by Computerworld magazine, most recently ranking number 3 in the world in the last rankings provided





In 2012 was named one of the most influential people and groups in online privacy by Techopedia.com





In 2012 was named a privacy by design ambassador by the Ontario, Canada, data privacy commissioner











Rebecca is an owner and partner for the SIMBUS services for healthcare organizations and their business associates to meet their HIPAA, HITECH, and other legal requirements, with more industries added in late 2014. Sh