The Smart Energy Code (SEC) places obligations on DCC Users (SEC Parties who have completed the User Entry Process) to notify the Security Sub-Committee (SSC) of any Vulnerabilities or Incidents that occur in, or cause a material adverse effect on the security of, hardware, software, firmware or a Device. These obligations are G2.11, G2.15, G2.30, G3.5 and G3.18.
In addition, DCC Users make use of the Smart Metering Key Infrastructure (SMKI). SMKI provides a secure and effective means of ensuring that messages to and from Smart Metering Equipment are properly authenticated, provide integrity and, where applicable, provide non-repudiation. SMKI can become Compromised (or suspected of being Compromised) and may adversely affect the security of a DCC User. DCC Users should inform the SSC and the SMKI Policy Management Authority (SMKI PMA) of a Compromise (or suspected Compromise) of their Cryptographic Material.
This form has been created for DCC Users to notify the SSC and/or the SMKI PMA of any Security Vulnerabilities or Security Incidents, or Compromises (or suspected Compromises) of Cryptographic Material. Egress is a secure and effective mechanism using encryption for sharing sensitive information and has been selected as the secure web-based platform to share confidential smart metering related information.