Professional Documents
Culture Documents
Appendix C Data Strategy
Appendix C Data Strategy
When we speak of “Data”, this covers a broad spectrum of both structured and unstructured data, across
our multiple information technology systems and business areas; this also extends to data found on
physical medium, such as plans, drawings or reports.
This purpose of this appendix is to set out our Data Strategy to provide clarity on how we intend to
manage, govern and use data in all its forms to ensure we are maximising our data assets and exploiting
their rich information. The strategy provides the guidance on how we intend to become a more data driven
organisation across the board.
Our Data Strategy is fundamental to achieving our mission of being the leading community focused water
company. Data is the life-blood of the organisation, being generated, validated, stored and used in all our
everyday business operations. It is a key asset and pivotal to us achieving our outcomes for the coming
future, while providing the means for optimisation and innovation. Our intention is to develop our internal
management and practices in AMP7 and beyond around our strategic view of data.
Our aim is to evolve and adapt our culture to be more data conscious, driving quality from the point of
capture right through the lifecycle, to support and help in achieving our business objectives. Our people are
a critical success factor in achieving the data vision, so we need to plan, train and foster an ethos where
data is central to everything we do rather than being just an output of a process or in some cases an
afterthought.
Supporting our people on this data journey, we will endeavour to apply proven technologies, learning from
our peers in the water industry and other sectors, on how to capitalise on our data assets, as we strive,
retain and build our company knowledge.
• A Business wide appreciation for data as a company asset: the ability for all staff, at all levels
of the company to understand and appreciate the value which data brings to the company, whilst
understanding the need to carefully manage this asset from end to end.
• Adapting our Information Systems for our business : As we become more data driven, we
must strengthen our IT-to-business alignment by collaborating more rigorously to define and
prioritise data requirements to meet our outcomes;
• Linking Data management to outcomes: Stronger internal alignment, particularly with our
Information systems, is a foundation for future-facing enterprise data strategies. Improvements to
data and its management should link directly to one or more of our outcomes.
• Collaboration of enterprise data and its strategies: Achieving the new level of business
synergy and alignment (as a foundation for our corporate data strategy) demands for
• Insight driven decision making: Being able to process, analyse and interpret data at all levels
within the company, whilst making sure that findings from data support the delivery of one or more
of our outcomes.
• The retention of critical company knowledge and data: It is crucial that we leverage our ability
to provide continuity in retention of the company’s knowledge, which must be transferable within
the business – ensuring that vital data is properly safeguarded and that information generated
(whether in physical or digital format) retains its place with the company and not just its people.
• Coordination among data management teams: Part of the concerted effort of our corporate data
strategy involves aligning multiple data management teams that exist within the organisation.
These teams need to collaborate and agree upon common standards for defining and modelling
key business entities (such as customers, assets, and financials) and how data about these can be
improved and shared across information systems. Standards for data and application development
should align with stated business goals for data;
• New data strategies for new business practices: We need to improve our response time to
operational events so we need fast, frequent data, in near real time via data services. To manage
our data requirements, we are investing in new systems, technologies and implementation of best
practices.
Our Data Strategy helps us to develop the plan for realising benefits around data problem areas. It helps in
effectively using our data for strategic advantage and operational decision making.
Not having a data strategy increases the risk of allowing each person within each department of the
organisation to develop their own methods for using and managing the information available. Systematic
data management at enterprise level will improve our business decision making, contributing to
improvement of business performance and growth, whilst addressing organisational requirements for easily
accessible and trusted data to be available for compliance and reporting.
Successful implementation of the Data Strategy will enable us to deliver benefits to customers and the
business, broadly by reducing the cost of processing data whilst increasing quality (and thus value) of the
data we hold.
At the heart of Data vision is the need to fulfil customer’s expectations better through data – we also want
to ensure the data vision is passed on through our business & people. Further benefits in other areas
include:
Customers
• Improve secure access to master information on asset condition, performance and customer
impact, reducing reactive incident response times and minimising interruptions to supply.
• Responding to customer needs in a tailored fashion - utilising customer call information and
network performance data, we were able to map the needs of customers at localised level,
providing a deep dive view of customer complaints throughout our operational area. Please see
case studies for further details.
• Keeping customers informed – We have achieved a 50% increase in the volume of social media
followers following the release of our social media application - and improved customer satisfaction
scores by over 40% between September 2017 and April 2018. This is a continued trend we will
endeavour to maintain. Please see case studies for further details.
• Only through better data insight can we understand and support our vulnerable customers,
personalising their experience and meeting their needs.
• Empowering customers to do more with data whilst building trust and transparency. . We will make
more use of customer feedback, customer call data and embed feedback into day to day asset
Our Business
• At the heart of successful data management lies a robust adherence to controlled processes. This
is critical to ensure business continuity, particularly when it comes to knowledge transfer. This will
ensure:
• Improved auditability and measurability of our processes and operations, supporting our
management processes and regulatory reporting.
• Enhance compliance with regulations, providing the ability to resolve issues quickly and effectively.
• A streamlining of business processes, reducing the waste and cost inefficiencies. Fundamental to
process improvements and automation is data quality.
• Improved corporate resilience. Having trusted and accessible data will allow us to adapt to
changes and support our people’s knowledge sharing.
• Maturity in data management and quality assurance will allow us to make sure we maximise the
value of customers money by making the right investments, thus improving our financial position
and increasing customer satisfaction.
• Improvements in data and reporting allow for more assured and informed decision making,
reducing risk of failure and potential punitive fines.
Our People
• Clear accountability of data is essential for regulatory compliance. We need to ensure that we keep
our company records, controlled documents and asset information in the right shape to deliver a
safe working environment.
• Training is key – everybody in the business has specific objectives to fulfil which relate back to our
outcomes. Achieving those is only possible by provide on-going development in all aspect of
strategic data management.
• Within Wholesale Operations, data is often created, stored, used and updated remotely. It must
therefore be accessible anytime, anywhere. Coupled with our planned IT strategy, investment in
data management provides the availability of data to our people anytime, anywhere.
• Health and Safety is our priority – a safe working environment starts with full knowledge of asset
condition and working procedures, whilst observing health and safety rules which are monitored on
a regular basis, through hazard reporting, risk assessments and method statements.
Our Technology
• Securing our data in the most appropriate manner will mitigate security risks, reducing potential
punitive penalties from breaches.
• Leveraging the use of innovative technology will become more and more important in the
information age – we must have the capability to deploy new methods for managing, processing
and storing large data now and in the future.
Improvement in data quality and its relevance help to: Increasing operational
efficiency.
• Improve overall insights, limiting the “garbage in, • By maximising the use of asset
performance data.
garbage out” conundrum. • By reducing duplication of
information.
We have been awarded the UK Government’s Cyber Security Essentials+ certification in October 2017 and
have continued to build upon the concepts of the certification by beginning the journey to fully align with the
Global Information Security Management System Certification ISO27001.
The governance structure is led by the Information Management Board (IMB), a senior executive level
board which authorises data and security policy, process, posture and ensure good practice. The IMB is
supported by 3 direct working groups:
• The Information Security Management Forum which provides cyber and information security
expertise and cyber initiatives for approval by IMB.
• The Data Protection Forum which provides Data Protection expertise and advice on regulatory
requirements for approval by IMB.
• The Data Governance Forum which provides data strategic initiatives and proposals for approval
by IMB.
Ensuring the confidentiality and integrity of customer and company data is a primary concern of our
business - a number of initiatives to protect both physical and digital data are currently in place. We are
introducing a company data classification process which, used in conjunction with Office 365 security
controls and our deployment of Data Loss Prevention (DLP) systems, will provide us with the ability to
monitor and manage data, with an emphasis on Personally Identifiable Information (PII) to fulfil our GDPR
commitment. Security testing for vulnerabilities, 3rd party penetration testing and remediation of critical
vulnerabilities detected on our external facing interfaces and within our applications respectively are
mature established processes. Risk and privacy impact assessments coupled with 3rd party management
will improve our risk posture and assist in the alignment with ISO 27001 requirements and GDPR/NIS-D
compliance. We have also created and are due to test our internal breach process to ensure our
preparedness for incidents and comply with the ICO and NIS-D regulation/directive for breach reporting.
We will therefore comply with ICO/NIS-D by effectively reporting breaches to the ICO/NIS-D within the
required 72 hours of becoming aware of a breach. The introduction of the monitoring system Darktrace has
provided a facility for in depth investigation of our network, server, desktop systems and data flows
providing the information security and infrastructure teams with alerts on detected anomalies and in
support of our cyber incident management process. This is discussed in more detail within the IT assets
section of the wholesale technical appendix. In preparation for GDPR, we have also reviewed contractual
agreements with our suppliers and stakeholders with whom we use and share data, all clearly defined
within our privacy policy.
Complimenting GDPR is the Network and Information Security Directive (NISD), which potentially has
similar punitive penalties for failures. Whereas GDPR’s focus is on the processing of personal data, NISD’s
focus is on the security of Information Management Systems within a Critical National Infrastructure (CNI)
environment. Our target is to go beyond mere compliance and aim for best practice in data protection as
prescribed by the ICO, embedding privacy by design and default throughout our organisation.
Our plan is to be implemented in a phased approach through AMP6 and AMP7, with some of those
initiatives shown opposite.
Providing real-world data to our business partners and research organisations has the potential to foster
greater insight and drive data innovation, with the potential for step changes in the water industry. Our
objective is to improve our data engagement with third parties to improve our business operations,
ultimately supporting our business outcomes and customer expectations. Many research projects
academic initiatives have been launched thanks to asset performance (leakage, metering, water quality)
and environmental information designed to improve out service to customers.
Our People ensure our business operations are completed in a professional manner, be it in the office or in
the field. Access to essential data is critical for our People to do their work in a safe environment.
Through the implementation of information management systems and End User Computing (EUC), we
ensure our people have access to the right data, anytime, anywhere and on any device. We are investing
further in collaboration and communication systems to support our people’s collaborative working
experience.
We have also made significant strides towards providing a resilient access to asset information remotely,
which provides operational resilience, particularly when responding to large incidents such unplanned
outages of bursts.
As we invest more in our data technologies our data resilience will mature, especially with the exploitation
of emerging technologies and large distributed fail-safe data management and processing solutions.
As part of our Data Governance, a programme of learning will be undertaken to educate our people on
great data use and promote a cultural step change toward good data practices and acceptable use. The
diagram below depicts our hierarchy of data users and ownership.
* We manage our asset * We employ smart * Using accurate asset * Create insight from
Making the most out of all
performance and track technology to monitor criticality and condition data to help reduce
water quality data from our leakage levels. data to make the right disruptions and improve
source to tap. * Collect accurate PCC investments . operational performance.
* We use water quality data to plan supply and * Move to a more * Enable our control
data to plan our demand at a localised personalised service for vision
acitivities and meet our level. customers, delivering * providing real-time
CRI and Mean zonal * Monitor aquifer and more information and information to customers
compliance river levels data to data on service level. on disruption - minimise
commitments. minimise customer * Simplify access to our unplanned outages .
* We provide customers impact and protect the tools and services (Billing, * We monitor pressure
with easily accessible and environment. network updates, water and burst data to make
transparent data on our quality, new the right investments at
water quality. developments) least cost.
Improvements in our data management is largely incentivised by these core pillars; improving operational
efficiency and expenditure, reducing risk associated with failing to meet our regulatory objective and
upholding the company’s perception to customers and stakeholders (who recognise our ability to manage
and safeguard critical data, whilst maximising its use to serve them best). This approach is critical to help
us map key areas for improvement, such as realising Opex savings in energy use, reducing our response
to network incidents or increasing the transparency and the volume of information we provide to
customers. In order to achieve our individual performance commitments, we intend to follow the approach
given in the mapping above – where data quality will be critical and collaboration will be crucial.
•We ensure data is •We maintain adequate •We can easily access data
consistent in its definition, data access and control to when required and share it
stewardship and ensure users have what to enable collaborative
interpretation, structure, they need decision-making
rules, format and value at •We comply with legal
any time, place and version requirements and best
of this information being practice data storage rules
used
The data lifecycle allows us to gain trust of our data through right oversight throughout its life. This will
allow us to optimise our data’s usefulness, improving our information while minimising the potential for
error. Finally archiving or disposing the data at the end of its useful life, will ensure we are compliant with
applicable legislation and will reduce the consumption of valuable IT resources.
The data lifecycle will become an important process within our Data Management programme especially
with the expected future data explosion from Big Data and the on-going development of the Internet of
Things (IoT) that will become prevalent within our industry over the coming years.
Specify
Archive
Collect
and
& Store
Destory
Requirements
& Governance
Share Assess
Analyse
Our approach to data is iterative and cyclical, whereby we need to continue and grow with the data, each
cycle brings a new dimension and insight.
In practice, it is not uncommon for a data stage needing to go backwards to the previous stage, typically
this is completed through the Governance processes or realignment of business requirements, which
essentially act as a review process and request for further definition and clarity. In effect, the data lifecycle
can have mini cycles within a few stages before moving on to the following stage.
One of the key principles of good data management lies in specifying what data we should keep and to
what standard, to conduct our day to day operations of the business.
When collecting new data, whether they are collected via machine automation or through human input, we
endeavour to ensure we collect the appropriate metadata and information properties which are needed.
Metadata is ‘data about data’, its characteristics that allow effective and efficient referencing. A data
object’s metadata can be thought of as a ‘fact file’ about it. This may include meaning, relationships to
The above process is already embedded as part of our “privacy by design” approach to data protection,
where we privilege the need to protect our personal data with the utmost care and privacy, particularly
when delivering new digital solutions likely to yield data and information as input or output.
Data collection occurs early in the lifecycle based on the specified data in stage one. This data could be a
raw data, file, image, or in document form. The information is typically entered or uploaded into an
application and accessible to certain roles within the organisational hierarchy on whatever devices offer an
access point to the proprietary system.
At this stage, it is important for those conducting data entry to ensure that the data they input or receive is
as accurate as possible, this will limit the data quality issues downstream.
As part of a solutions delivery process, the data storage mechanism and its associated security, availability
and recoverability is designed. Typically, this is implemented through a traditional database management
system onto physical disk, although larger distributed data management solutions are changing this
pattern. However, this design process provides valuable knowledge and accountability as part of our
governance process ensuring continued business operations through strong architectural processes.
Data quality is an essential element of any data strategy as it demonstrates the effectiveness of the data
strategy and underpins the trust in our data inputs and outputs.
The “assess and improve” stage supports data quality by providing the “checks and balances” to our data,
ensuring what we’ve specified in stage 1 matches what we’ve collected in stage 2. This stage provides the
assurance that our data aligns to our requirements and governance controls, providing a measurable view
of our data.
Any identified gaps in accuracy or completeness will be addressed, as this critical to the analysis phase.
For instance, burst records maybe missing information on pipe characteristics and thus may need to be
inferred. This stage provides the assurance that our data aligns to our requirements and governance
controls, providing a measurable view of our data.
It is a necessity that we trust our data, and only though continually data quality validation can we gain the
measures by which we have confidence on our data. Without this trust, the next stages of the data lifecycle
cannot be trusted and as such, our data strategy would be ineffective.
As noted, this stage uses the information generated from stages 1 & 2 to validate our data, however, it also
looks to provide the mechanism and guidelines to correct and continuously improve our data. Where data
quality issues are found this should be highlighted back through the Requirements and Governance
process and readdressed through stages 1 or 2.
The Analyse stage supports the use of data to generate information and provide insight. Typically
categorised under the Business Intelligence (BI) banner, this includes the reporting, dashboarding and
analytical processing of our data into information and knowledge. Simply put, how we use our data to be
informed.
Underpinning our analyse data stage is our hereditary need to optimise our “totex” management of the
asset portfolio, whilst delivering great customer service. The techniques and services used during this
stage of the data lifecycle have an inherent impact on our efficiency as a business from an Opex and
Capex perspective.
However, we also rely heavily of ad-hoc analysis of structured data, through business intelligence platform
services for reporting and analytics dashboarding. These tools enable us to explore the data in more detail
utilising descriptive statistics techniques (mean, mode, median, and frequencies) to understand current
trends, with more qualitative data analysis, particularly when examining unwanted contacts from
customers.
All these systems and techniques support our regulatory submissions (WRMP, Business Plan, Annual
Financial Reports) but the majority of our data analysis is carried out to support our business operations.
This stage of the data lifecycle relates to making data and information derived from the previous stages
available to our people, partners and customers in a secure and robust manner.
One of our goals is to support our regulators view which aims to:
• Use data to improve customer service and support to those who need it most.
• Be more transparent, which in turn drives accountability and legitimacy building trust;
• Develop materials and support to help sell the benefits of data sharing internally.
To get the most value from our data and drive different behaviours, it is key to keep our people informed.
Through the application of technology, we will be able to share our information to support our operational
teams, so they can work as efficiently as possible in a safe working environment. During AMP6 we have
invested heavily in our communication and collaborative systems, enabling the means to effectively deliver
information anytime, anywhere on any device.
To support the government’s Open Data charter and Ofwat’s customer data vision as outlined in
“Unlocking the value in customer data” report, our vision is to develop our engagement with stakeholders
(public, third party, academic), utilising our operational and environmental information to educate and
develop new techniques and understanding.
Our aim is to help customers navigate to the information they need, whilst also facilitating the collection of
the data we need from customers (for example, the new MyAccount platform will enable customers to
update their personal occupancy and billing details online, therefore facilitating and enhancing the
customer experience). To support customers and provide an inclusive service for all, we will build on our
self-service capabilities to provide richer information in a secure manner. We see this as critical to
empowering the customer to effectively manage their water use.
Stage 6 of the data lifecycle supports our responsibility to ensure our data and information is managed and
destroyed in accordance with legislations and customer expectations.
We adopt a robust data archiving and destruction policy which ensures that retired devices and media
have their contents securely removed, destroyed, or overwritten and physical documents are destroyed
appropriate to their security classification.
The requirements and governance should be validated at each stage of the lifecycle and provides the
mechanism to revert to previous stages in an iterative process where further understanding may be
required.
Requirements
Requirements are essential to great data management. Requirements set the expected outcomes required
within the data’s lifecycle and provide understanding to each stage to ensure what is being delivered meets
our expectations.
Governance
Data governance is an essential part of our overall data strategy and provides the roles, policies,
procedures and guidance to ensure accountability and ownership of our data assets. Data governance
provides the means to measure and support the delivery the Data Management programme in a
sustainable manner.
During AMP6, supporting our Information Security programmes we have developed a series of user forums
supported by a centralised Information Management Board (IMB). These forums will work to provide the
necessary assurance and governance to our Data Strategy. The diagram below depicts our governance
organisational hierarchy. Although not explicitly stated in the title, the Requirements and Governance
stages should also validate that our data conforms to our information security standards taking a
Confidentiality, Integrity and Availability (CIA) approach.
Information Management
Information Security
Securty Champions
Management Forum
Board (IMB)
Data Protection
Data Protection Forum
Champions
Although not explicitly stated in the title, the Requirements and Governance stages should also validate
that our data conforms to our information security standards taking a Confidentiality, Integrity and
Availability (CIA) approach.
Confidentiality
Integrity
The ability to ensure that data is an accurate and unchanged representation of the original secure
information. One type of security attack is to intercept some important data and make changes to it before
sending it on to the intended receiver.
Availability
It is important to ensure that the information concerned is readily accessible to the authorised viewer at all
times. Some types of security attack attempt to deny access to the appropriate user, either for the sake of
inconveniencing them, or because there is some secondary effect. For example, by breaking the web site
for a particular search engine, a rival may become more popular.
These reports are monitored on a regular basis to ensure we can follow up on data changes in our register.
Any issues which cause significant risk are dealt with by the wholesale team, data quality team and IT. We
have also developed a data cleansing dependency model which maps and identifies the people and data
sources affected by changes to non-household properties or meter attributes; this means that changes to
the data in our system triggers a notification to stakeholders who are responsible for the document
updates. This can be explored further in our case studies.
Looking after customer data is our primary concern. Initiatives to protect both physical and digital data are
currently in place. We are currently reviewing the introduction of a data classification system in conjunction
with Office 365 security controls and a Data Loss Prevention (DLP) system to monitor and manage all
data, including personally identifiable information.
Security testing for vulnerabilities and 3rd party penetration testing and remediation of critical and external
facing interfaces are established processes. Risk and privacy impact assessments and 3rd party
management is being further improved as part of our alignment with ISO27001 and GDPR requirements.
We have reviewed our contractual agreements with our suppliers and stakeholders whom we use and
share data with as clearly stated as part of our privacy policy 1.
We have also reviewed our internal breach process to ensure we duly prepare for incidents and comply
with the ICO regulation on breach reporting; therefore, we ensure to report breaches to the ICO within 72
of becoming aware of the breach.
The introduction of the monitoring system Darktrace combined with inbuilt machine learning has provided a
facility for in depth investigation view of our IT network, server, desktop systems and the data flows
providing security and infrastructure teams with alerts on detected anomalies to support our cyber incident
management processes.
1
https://www.affinitywater.co.uk/privacy-notice.aspx
By making more use of customer calls data and analysing social media traffic during incidents we were
able to pro-actively support customers with a good knowledge of issues before they call us, thus helping us
to improve our customer satisfaction score by 40%. This can be explored further in our case studies on
social media and contact centre analytics.
Through EIM we aim to support the delivery of the Data Strategy by:
• Education, through our standard learning processes and tools to embed our Data Strategy and
processes throughout the organisation.
• Data Knowledge, through strong architectural processes and knowledge sharing, proving the
collateral to our communities to understand our data and its use.
• Data Governance, through delivery of tools and processes to support our communities in their data
roles and responsibilities
• Data Security, through great Data Governance combined with Information security processes
• Data Innovation, through knowledge, we aim to implement pilot projects and initiatives to
implement data services and technologies and improve insights
• Compliance, through Data Knowledge and Governance combined with a risk-based approach to
understand how we comply with legislation and regulation.
To support the delivery of our EIM programme, we ensure to deliver robust training to our staff in order to
develop our data management skills in relation to our strategic objective, including cyber security, data
protection, data ownership, data process management and analysis of data. This journey is on-going in
AMP6 and will continue in AMP7 as we ready our people to be more data centric in thinking, a radical shift
in culture. Training will also enable us to continue our compliance with legislative and regulatory standards,
whilst pushing ISO compliance in key areas such as data quality (ISO8000:150) or cyber security
(ISO27001).
We have developed our Situational Awareness solution which provides a single plain of glass view of our
production and network telemetry data, enriched with our operational information, customer contact and
combined with geospatial data layers. The aim of this solution is to understand our operational events
through telemetry data in the context of the environment around them, in “situation”. This solution supports
our Control Vision programme which is designed to increase our operational awareness and streamline
processes to achieve our demanding outcomes, particularly in leakage, bursts, unplanned outage and
water quality commitments.
In AMP7 we aim to invest and develop this solution further, exploiting proven technologies such as
predictive analytics and Machine Learning in efforts to move to more real-time operations and event
management, reducing the amount of manual intervention.
Through the adoption of AI, we see potential in supporting both our business operational communities and
customers. Complemented with predictive analytics and automation we aim to deliver a more cost-effective
service through informed decision making.
Today we have employed Machine Learning as part of our Darktrace implementation. Darktrace is a
security monitoring solution that is actively tracking our IT infrastructure usage patterns, using machine
learning to spot anomalies and suspicious events, making our Information security operational team aware
to investigate potential issues.
Moving forward we anticipate the use of AI within our Situational Awareness application, will support our
shift to more real-time event processing, thus reducing our Time to Action and Mean Time To Repair
(MTTR).
A well-formed governance framework is therefore required in AMP7 with the expectation of leveraging
augmented and embedded analytics with machine learning for example, generating insights on
increasingly vast amounts of data.
Further data management tooling investment is ear-marked for AMP7. These platform capabilities are for
accessing, integrating, transforming and loading data into self-contained performance engines, with the
ability to index data and manage data loads and refresh scheduling. Talend (shown here on the right) is
our current Extract, Transform & Load (ETL) choice of tooling and examples of its usage in AMP7 include
the integration of key asset systems such as Hi-Affinity, GIS, Trace, Pioneer and AMIS. Such endeavours
will assist our company to eliminate inconsistencies through automation of manual interfaces between key
systems.
This is why we are working with key data specialists across the business to strengthen our data lifecycle
management, focussing on sharing analysis techniques, data processing skills, document safekeeping and
sharing valuable insight and knowledge which already exists within the business. To this end we
encourage our people who play key roles in data management and are involved in core business
processes to engage with the centre of excellence.
This group will be critical to help us deliver a successful outcome in AMP7 for Information management,
ensuring we review our reporting priorities, work to provide technical data training where required and
share important issues which may have cross – department impact.
• Legal
Whilst making it accessible to our people, customers, regulators, and our partners.
We are committed to delivering a robust lifecycle approach to data and using innovative information
technology to deliver our company vision and objectives. This will be achieved through the synergy of our
people, processes, data and our information systems, which will work in unison for the successful delivery
of our strategy.
Our Data Lifecycle in Motion with examples of best practice data use.
Each of the case studies
demonstrate the value added by
applying the data lifecycle to
business as usual data.
2
Our Data Lifecycle in Action
See how data driven decision making supports our service to customers.
3
Using web data, social media and customer analytics
To provide a bespoke customer service and improve customer satisfaction scores by 40%.
Segment
Segment B: 67%
A: 35%
Local Postcode
Customer district
Operation
calls data
al data Segments Segment C:
2%
We needed customer calls The data is collected via Results stored as a spatial
Data was cleansed and
information with the our service desk, who Three “core “ groups dataset and tabular list of
normalised to compare
location of those postcode collate information and is identified which segments – the
like for like call volume per
districts. We also required stored in our Billing differentiate themselves. methodology is replicable
capita.
network data. System (Hi Affinity) and re-usable.
7
Improving data management in Open Water
Our Wholesale service desk is now top of the wholesalers' league table.
We need to ensure that the Information is stored in the The working group is able to operational performance The performance data on
data held on CMOS and in our CMOS database and our monitor and assess data standards (OPS), which sets meter exchanges, supply pipe
systems is of a high quality to system – divergence of data in quality on SPID, address point service level agreements changes and retailer changes
drive settlements and SLAs – monitored to enable us to and database divergence to (SLA) Went from 95.81% to is shared amongst the 3
ensuring it mirrors the current minimise manual data ensure we maintain a high 99.7%, putting us in top spot parties in the working group to
state of the market. cleansing. standard in data quality within the industry overall. continue our great service.
8
Improving Information Security with Cyber Essentials
Certification to the UK Government Cyber Essentials Plus Standard.