AMI Privacy & Security

Privacy and security are fundamental to the AMI network solution. The comprehensive security design protects the AMI network and keeps customer data safe from intrusion.

Standard industry security features are built into the smart meters, communications networks, pole-top mounted network devices, network management system, and head-end software. Data is protected while it resides in the end devices and network devices, as well as during network transmission. System user activity is monitored and recorded for auditing and compliance.

What type of data does an advanced meter collect?

Just like older meters, advanced meters collect energy usage data. Advanced meters also collect additional operational data such as hourly usage data, voltage data, outage data, and diagnostic flags to help us provide more reliable service.

Advanced meters do not collect, store, or transmit member-identifying information such as names, addresses, or usage data on individual appliances or equipment.

How does Connexus Energy use my energy usage data?

We use member energy usage and operational data for billing purposes, troubleshooting, and resolving problems with equipment or solutions. In addition, we will eventually provide this data for our residential members to view online and will be able to offer new pricing programs.

Will Connexus Energy share my information?

No. We treat personal information and data about our members as confidential. You retain ownership of your own privacy data (including energy usage). Connexus Energy will not disclose that information to external parties without your permission, except for official Connexus Energy business or as required by law.

How secure is my data in the wireless communication system?

Extensive cyber-security measures are in place throughout the AMI network to secure and protect customer data.
  • Access to meters and usage data is controlled with authorization requirements.
  • Information is secured at the meter and to our systems with advanced encryption.
  • Pole-top network devices are placed in locked and alarmed boxes to prevent unauthorized access.
  • Data from the network must pass through firewalls and security components before reaching Connexus Energy.
  • All access to the AMI system is logged and recorded to alert us of unusual activity.

AMI Security Features

Multi-pronged security architecture provides confidentiality, integrity, availability, and auditability, and includes:
  • Access and authorization – supports role-based user access, so that only users with certain levels of authority can perform specific tasks. The system also uses access control lists.
  • Authentication – limits transmissions on the AMI network to authorized devices and personnel only. The AMI system deploys sophisticated authentication techniques.
  • Information security – use of AES encryption and authentication on each section of the communications network. Information security is further enhanced through the use of auditing and logging of system activities and data manipulation, guaranteeing non-repudiation of all system information.
  • Data integrity and encryption – ensures that information generated and passed through the system has not been changed or altered in transit – either inadvertently or intentionally. Deploys NIST-approved encryption modes and algorithms.
  • Monitoring and reporting – The AMI system incorporates security audit logging and reporting to allow early detection of any possible security issues.

For additional information, contact Connexus Energy at 763.323.2650.