Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
7 October 2015
Acronyms .......................................................................................................................................................... 2
Index of Tables.................................................................................................................................................. 6
Index of Figures ................................................................................................................................................ 6
1 Executive Summary .................................................................................................................................... 9
2 Business Requirements ............................................................................................................................12
3 Data Requirements ...................................................................................................................................14
3.1 Data Entry Templates ........................................................................................................................14
3.2 Data Models .......................................................................................................................................15
3.2.1 Subject Area: Energy Sales ........................................................................................................17
3.2.2 Subject Area: System Performance ............................................................................................19
3.2.3 Subject Area: Financial Performance .........................................................................................21
3.2.4 Subject Area: Institutional Information ........................................................................................23
3.2.5 Subject Area: Project Statistics ...................................................................................................25
3.2.6 Report to Data Model Mapping ...................................................................................................27
3.3 Key Outputs........................................................................................................................................30
3.4 Data Dictionary ...................................................................................................................................33
3.5 Data Governance ...............................................................................................................................34
3.5.1 Data Maintenance Process .........................................................................................................34
3.5.2 Data Owner and Custodian.........................................................................................................35
3.6 Historical Data ....................................................................................................................................36
3.7 Data Retention and Archiving ............................................................................................................37
4 Application and Technology Architecture ..................................................................................................38
4.1 Application Architecture .....................................................................................................................38
4.1.1 Business Intelligence (BI) ...........................................................................................................39
4.1.2 Web Portal ..................................................................................................................................48
4.2 Technology Architecture ....................................................................................................................52
4.2.1 Hardware Requirements .............................................................................................................52
4.2.2 Database Requirements .............................................................................................................54
4.2.3 Network Requirements ...............................................................................................................55
4.2.4 Work Station Requirements ........................................................................................................57
4.2.5 Delivery Models ..........................................................................................................................57
4.3 Cost Estimates ...................................................................................................................................62
4.4 Service Delivery Standards ................................................................................................................64
4.4.1 Service Availability ......................................................................................................................64
4.4.2 Security .......................................................................................................................................65
4.4.3 IT Operations and Maintenance .................................................................................................68
4.4.4 Exit Process ................................................................................................................................71
Index of Figures
Figure 1: BI System Components .....................................................................................................................10
Figure 2: Server Landscape .............................................................................................................................10
Figure 3: Implementation Schedule ..................................................................................................................12
Figure 4: Portion of Multi-Dimensional Analysis Matrix for System Performance ............................................16
Figure 5: Cross-Analysis of Subject Areas .......................................................................................................16
Figure 6: Energy Sales Data Model ..................................................................................................................17
Figure 7: System Performance Data Model .....................................................................................................19
Figure 8: Financial Performance Data Model ...................................................................................................21
Figure 9: Institutional Information Data Model ..................................................................................................23
Figure 10: Project Statistics Data Model ..........................................................................................................25
Figure 11: Sample Output Dashboard 1 ...........................................................................................................30
Figure 12: Sample Output Dashboard 2 ...........................................................................................................31
The Design Phase is the final and concluding phase of this project.
Based on the findings from the Inception and Discovery phases, the IT Design for NEA was prepared in
accordance with what will help NEA ultimately meet the mandate to support total electrification through the
technical and financial proficiency of the Electric Cooperatives (ECs).
Business Requirements
The primary needs recognized that will have to be addressed by the IT Design are:
(1) Receipt and organization of EC data, and
(2) NEA's analysis of EC data for more effective support to the ECs.
The IT System is expected to address the current process inefficiencies in reportorial submission and
management. Once the IT System is implemented and process inefficiencies are addressed, significant
enhancement in NEA’s effectiveness is expected as the system shall facilitate data exploration, mining and
analysis, enabling NEA to use accurate and timely data to more effectively fulfil its EC oversight function.
Once NEA starts using the technology and evolves in its data analysis maturity, it is expected that they will
then be performing even deeper, more insightful, more creative, and non-siloed analyses as a result of
having EC data that are easily accessible through the system.
Data Requirements
For effective analysis, data must be collected from the ECs in a structured format and granularity meant to
address the analysis needs.. Use of standard report templates with clearly defined data elements in the data
dictionary is necessary to facilitate data collection and enforce the right data format needed. These data will
be uploaded into the centralized data warehouse in accordance to the defined data models to allow data
mining, exploration and analysis. The recommended data models presented in this document were designed
to consider all the data needed to perform the BI analysis opportunities identified during the Discovery
Phase.
Once these data are uploaded in the data warehouse, various reports prepared by NEA and the ECs (i.e.,
MFSR, MER, MIR, Fact Sheet, etc.) can then be automatically generated by the system through regular
batch and/or ad-hoc processes. More importantly, pertinent analyses that are key to NEA’s fulfilment of its
EC oversight function can then be performed efficiently, with just a few clicks, as quality data will be readily
accessible in the system through the reports and dashboards which are standard features of a BI System.
The usefulness of the reports and dashboards is only as good as the quality of data used by the IT System.
As such, data integrity must be ensured throughout the end-to-end process of data collection, upload,
processing and consumption. For this reason, it is important to establish Data Governance to define a set of
policies, procedures and accountabilities aimed at ensuring integrity of data stored in the database to
manage end-to-end data quality. This involves establishment of processes for data management and
maintenance, as well as definition of data owners and custodians for the data specified in the data models.
Data Governance has to be in place before the system goes live to ensure that there is appropriate control
needed to maintain the quality of data used by the data consumers.
Application Architecture
The technology identified to support the business requirement of supporting efficient EC data collection and
providing effective data analysis is an IT System composed of a BI System and a web portal. The web portal
will serve as a data entry facility with which the ECs and NEA can upload data through structured templates.
These templates are to be populated offline to address the internet access limitations of some ECs. The BI
System, on the other hand, will be the technology for data organization, storage and processing which NEA
can use to analyse EC data. The designed BI System is composed of three components: (1) Data Integration
layer, the component that collects raw data from sources, transforms it into structured data and loads into the
data warehouse. (2) Data Warehouse, the central storage of data for analysis, and (3) Business Intelligence
Data Business
Warehouse Intelligence
Layer
Relational • Database access
Database • Audit user activities
• Secure and Control
• Predictive Models
Data • Historical Data
Data Model and Analysis
Integration
• Custom search and
filters
• Charts, Graphs &
other Analytics
ETL
Integration
Metadata
Extract,
Data Entry Analyze, Publish &
Transform Query & Mine
Web Portal Share
& Load
Comparison of major software products available in the market was also done to highlight strengths and
weaknesses, which can serve as inputs to the software product evaluation to be conducted in the next
phase.
Technology Architecture
One key aspect in any solution is having the necessary infrastructure resources to run the solution. This will
help ensure that the desired system performance is achieved during the day-to-day operation of the system.
The recommended system architecture for the IT System is illustrated below (Figure 2). As the system will be
exposed to external users (ECs, DOE, ERC, etc.), the architecture should have a demilitarized zone where
some system components will be located to provide a secure channel or gateway for external users to
access the system and view information stored in the system without affecting the internal components of the
system.
Implementation Phase
As presented in the schedule below, the expected duration for the implementation of both the web portal and
BI System is 10 months, with concurrent implementation of the two systems and excluding the additional
year for post-implementation support.
During the Implementation Phase, an effective change management strategy is necessary to facilitate
acceptance of the change and promote commitment of stakeholders on the project. Key aspects of Change
Management include proper communication of change, strong leadership and support from management,
capacity building, and measurement of key result areas and success factors of the project. Change
management is important during implementation to minimize resistance to change and promote a smoother
transition from the current to the envisioned state, increasing the factors that will make NEA attain the
project’s objective of promoting more effective support to the ECs through the use of technology that
facilitates efficient data collection and management.
2 Business Requirements
The foremost objective of the NEA IT Design Project is to support how NEA can be more effective in meeting
the mandate of total electrification. Currently, data is submitted by the ECs in MS Excel files containing
reports that are not uniform in format when submitted. Additional data comes from the biennial activity, the
eICPM, where ECs prepare their demand, sales and financial forecasts. All the data received by NEA is
processed to extract the relevant data which is summarized further into more reports. This activity entails re-
encoding and extensive word processing activities that take up NEA resources. Often, the focus is derailed
from getting a thorough and comprehensive understanding of the ECs to meeting report submission
deadlines.
To support the objective of understanding the data to provide ECs with guidance and advice, these are two
key business needs realized throughout the duration of this project, which this project intends to address:
(1) Receipt and organization of data from the ECs, and;
Scoping and Design of IT Systems Upgrade for NEA (Confidential) 12
(2) Analysis of data from the ECs to arrive at effective feedback and action plans.
During the Discovery Phase, data collected from ECs was dissected to arrive at analysis opportunities that
could further enhance NEA's regular review and assessment of the ECs' operating situation, in accordance
to NEA’s mandates of total electrification, ensuring EC financial viability and technical proficiency,
implementing EC governance, receipt and monitoring of reports, restructuring of ailing ECs, and support for
deregulation. The analysis opportunities were identified from the perspective of data being strategically
organized and accessible with the help of Business Intelligence (BI) technology and will serve as the basis
for the design details presented in this Design Report.
The implementation of a BI System is expected to address the process inefficiency of reportorial submission.
Once the technology is implemented, improvement in effectiveness is expected to follow as the tool shall
facilitate data exploration, mining and analysis. The identified BI support opportunities specified in the
Discovery Report are just the initial list of possible analyses that can be done by NEA to more effectively fulfil
its EC oversight function. Once NEA starts using the technology and evolves in its data analysis maturity
level, it is expected that NEA will then be performing deeper, more insightful, more creative, and non-siloed
analyses as a result of having accurate, timely and readily available EC data that will be easily accessible
through the system.
In addition, during the Discovery Phase, it was also realized that there are ECs in locations that have internet
connection problems. Hence, it is imperative that the IT System be designed such that this constraint will not
hinder the efficient submission and uploading of data into the centralized database that will be for NEA's
various analyses.
As much as data is critical to NEA's operations, its handling is fundamental in BI technology. This section
aims to discuss how data will be received and managed moving forward with such a system.
Data will enter the system through defined data entry templates with fixed fields and expected values (i.e.,
numeric, 10 characters, 4 decimal places, value 1, 2, n, etc.). These templates will contain the data sufficient
to generate the MER, MIR, MFSR, MPSMR and other key outputs. It is critical that the content of these
templates be established and followed accordingly as validation rules could be set up in the system to
ensure only the required and correct data are entered in the system. Once loaded in the system, the data will
be organized according to defined the Data Models.
To ensure common understanding of each data item, a Data Dictionary was initialized through this project
which NEA will maintain moving forward. This can also be further elaborated or refined by the system
implementor to incorporate other data entities that will be decided on in the final technical design during the
implementation phase. Aside from this, certain governance procedures relevant to data management will
have to be established and practiced.
The initial data content of the NEA IT system recommended will rely on a data upload activity to enter
historical data into the system. As one of the activities in preparation for implementation, guidance is
provided in this document. Lastly, also in preparation for implementation, NEA must decide on how long data
must be available in the system, as well as the procedures for obtaining data beyond the defined period of
availability.
These data requirements are described in more detail in the succeeding sections.
1
Governed by the Data Dictionary described in Section 3.4 Data Dictionary
2
Complete list in Section 3.3 Key Outputs.
3
Some fields for calculated or summarized data are retained in the Data Entry Templates but only for EC’s reference while
accomplishing the template. These fields will not be picked up by the web portal; instead, necessary calculations to generate different
measures using similar granular data will be performed in the system.
Scoping and Design of IT Systems Upgrade for NEA (Confidential) 14
For the ECs – data required will be entered and submitted in a single instance only. No more
4
multiple entries of the same data.
For NEA - the templates and web portal will require and accept the defined values only. Data
received from the ECs will be in the same format and granularity for easier comparison and analysis
without data re-encoding.
The templates are recommended to be in MS Excel format so that these can be completely populated by
5
ECs with or without automated systems or a stable internet connection . Accomplished templates will then be
uploaded into the web portal.
The mature technology options available for the report submission templates include electronic forms (such
as but not limited to those sold by software companies such as Adobe, Microsoft, IBM, etc.) as well as
spreadsheets (e.g. Microsoft Excel). These technologies can address the requirement of allowing ECs to
enter structured data into the templates offline without the need for internet connection. These technologies
also allow certain fields to be calculated based on the data entered in other fields, as well as provide offline
data validation as first level data check (e.g. data should be numeric, data should be in the pre-defined list of
valid values, value should be positive, etc.). However, some features of electronic forms cannot be
maximized due to internet limitations of some ECs in remote locations. These features include online
workflow management, online approval of forms, online collaboration for accomplishment of the form, etc.
require reliable internet connection. On the other hand, using MS Excel as a template addresses the
requirement for data entry and provides advantages such as (1) familiarity of both NEA and ECs with the
tool, requiring minimal effort to transition (2) high usability as it is easier to enter multiple data fields in
spreadsheets and allows copy-pasting of values from other external files (3) NEA and most ECs (if not all)
are already using and have existing licenses for Microsoft Excel. For any technology, built-in security
features of the technology to secure the templates must be utilized to protect the template (formulas, list of
valid values, format, etc.) from being manipulated by the ECs or other unauthorized users. This must be
6
complemented by policies and penalties/sanctions for those who will manipulate the standard templates .
Data entry will not only for ECs' monthly reportorial requirements. Data from the biennial eICPM will also be
uploaded to track and monitor developments in the planned projects of the ECs, especially projects in
support of total electrification. Also, there are data entry templates designed to enter data from NEA such as
Audit Findings.
Samples of these envisioned data entry templates are provided in Annex 6.1. It must be noted that the data
entry templates are samples and are for illustration purposes only. It is expected that the system
implementor will further refine and elaborate on the templates as needed, for their detailed technical
specification prepared.
4
These templates are designed to replace the MFSR, MIR, MER, PSMR templates, etc. currently used by the ECs to submit required
data. Instead, the MFSR, MIR, MER and other reportorial requirements will be prepared using the NEA IT System based on submitted
data.
5
Since there are ECs that might not be able to comply with online entry of templates, the offline option ensures that all ECs will be able
to comply.
6
Other government regulatory agencies that have implemented BI (e.g. Bangko Sentral ng Pilipinas) have established policies and
sanctions to prevent manipulation of standard templates (e.g. Bangko Sentral ng Pilipinas as regulator of universal, commercial, thrift,
rural and cooperative banks);
7
There is a single Data Model designed for the NEA IT System, however, for presentation purposes in this document, the Data Model is
presented per Subject Area.
Scoping and Design of IT Systems Upgrade for NEA (Confidential) 15
"Technical". Project Statistics and Energy Sales subject areas contain data related to both Financial and
Technical. Institutional Information is similar to "Institutional".
Sections 3.2.1 to 3.2.5 present the Data Model for each of the Subject Area. Each of the section is also
accompanied with a Multi-Dimensional Analysis Matrix. The Multi-Dimensional Analysis Matrix presents how
the subject areas can be analyzed through the dimensions (listed in the left-most column).
As an example, Figure 4, a portion of the Multi-Dimensional Analysis Matrix for the Subject Area Energy
Sales, shows that data related to Energy Output Statistics can be analyzed using the Calendar, EC Profile,
Location Details and Class of Service Type dimensions. Specifically, this means that Power Sales (kWh)
(stored in the Energy Output Statistics table) can be analyzed by looking at Power Sales per month, quarter
or year (under the Calendar dimension). Furthermore, Power Sales can be analyzed using the combination
of Power Sales per month, quarter or year per Class of Service (i.e. Residential, Commercial, Industrial) per
region and so on.
8
Figure 4: Portion of Multi-Dimensional Analysis Matrix for Energy Sales
Additionally, the matrices also show cross-analysis of subject areas wherein data from different subject areas
may be compared using the same dimensions. To illustrate, Sales per Employee (Energy Sales Subject
Area) and Salaries (Financial Performance Subject Area) can be compared using the Island Group
dimension (Location Details) that can show, for example, in Luzon, ECs with higher Sales per Employee
have higher employee salaries, but in Visayas, the profile is the opposite.
8
Complete table in Section 3.2.1
Scoping and Design of IT Systems Upgrade for NEA (Confidential) 16
3.2.1 Subject Area: Energy Sales
Figure 6: Energy Sales Data Model
Table
Projected Utility
Energy
Energy Projected Projected Unbundled
Output
Consumption Demand Connections Rates
Statistics
and Demand
Dimension Calendar x x x x x
EC Profile x x x x x
Location Details x x x x x
Class of Service Type x x x x x
Grid Type x x x x
Charge Type x x
Power Sup pl y Fo re ca st
Date I D
EC
Power Plan t ID Sys te m St at is tic s
Fue l Re qu ire m en t L oc at io n De ta ils Hist ory EC Ge og ra ph y Date
In st al le d Ca pa ci ty Relat ion_7594
L oc at io n De ta ils Relat ion_1698
EC I D EC I D
[Bara
0, 1] n ga y ID [ 0, 1]
Net De p en da b le Ca pa c ity Relat ion_7595
Dist ric t [ 0, 1] Bara n ga y ID Bara n ga y ID Pea k Lo ad (KW)
Net Prod uc ti on L oa d Fa ct or
City In co m e Cl as s ID [ 0, 1]
Con tra c ted De ma n d [ 0, 1] [ 0, 1]
Relat ion_1031 M AI FI
Prov in c e Dist ric t [ 0, n] Relat ion_1697
Con tra c ted En erg y [ 0, 1] SAIDI
Reg io n City
Cap ac it y Us ed fo r Own Lo ad Relat ion_4798
SAIFI
Is la nd Gro up Prov in c e
Ene rg y Us ed f or Own Lo a d SARVI
Effe ct iv ity Dat e Reg io n [ 0, 1]
Ene rg y Su pp ly [ 0, n] CAIDI
Is la nd Gro up
Firm Co ntrac te d Ca pa c ity Relat ion_1722
[ 0, 1]
Sys te m Lo s s
[ 0, n] Start Da te EC Pro fi le Hi st ory
Power Sup pl y Sta ti sti cs End Dat e Surrog a te EC I D Tec hn ic al L os s
Power Sup pl ie r Power Sup pl ie r His tory Relat ion_1030
Non te ch ni ca l Lo ss
Date Sus ce p tib ili ty to Typ ho o n EC I D
Power Sup pl ie r ID Surrog a te Po wer Su pp li er ID [ 0, n] Sys te m Lo s s Ca lc ula ti on Too l
EC I D Urba n Rura l Cl as si fic at io n EC Na m e
Power Plan t ID Relat ion_4780
Sup pl ie r VAT Reg TIN Pop ul at ion [ 0, n] [ 0, 1] Grid Typ e Date o f La st Upd at e
Plan t Na m e Relat ion_7596
Power Plan t ID
Sup pl ie r Nam e [ 0, 1] Per Ca p ita In c om e [ 0, n]
Effe ct iv ity Dat e Ass et Date
Plan t In form at ion Actu a l Dis pa tc he d M ax Powe r
Sup pl ie r Add re ss Power Plan t Date o f Inc
Plan t Lo ca ti on Actu a l Dis pa tc he d En e rg y [ 0, n]
Sup pl ie r Con ta ct No Power Plan t ID Date o f First Ene rg en
Plan t Ty pe Curt ai le d En ergy
Sup pl ie r Con ta ct Pers o n Sup pl ie r ID M em b e rsh ip
Sup pl ie r Typ e Sup pl ie r VAT Reg TIN Relat ion_7480 Plan t Na m e Power Sou rc e
Plan t Owne r ID EC Pro fi le
Plan t In form at ion Ene rg y Inp u t Sta tis tic s
Cap ac it y (M W) Plan t Lo ca ti on [ 0, 1] EC I D
[ 0, 1] Date
[ 0, n] Con ne c tio n Po in t Plan t Ty pe EC Na m e
Fue l Re qu ire m en t Relat ion_11423 Relat ion_1652 Grid Typ e EC I D
[ 0, n] VAT Reg TIN [ 0, 1] Relat ion_1654
[ 0, 1]
Relat ion_7530 [ 0, n]
Power Sup pl ie r Typ e [ 0, n] Start Da te [ 0, n] Ene rg y Pu rc ha se d
Cap ac it y (M W)
[ 0, 1] Stat us
Relat ion_1721
Relat ion_11422
End Dat e [ 0, n] Ene rg y Ge ne ra te d
Con ne c tio n Po in t [ 0, n] [ 0, 1]
Effe ct iv ity Dat e Date o f Inc Tota l In pu t
Fue l Re qu ire m en t
Relat ion_4057 Date o f First Ene rg en
Relat ion_7533 Power Sup pl ie r Typ e [ 0, n]
Power Plan t De ta ils [ 0, n] Stat us [ 0, n] M em b e rsh ip
[ 0, n] Relat ion_3886 Relat ion_3882
[ 0, n] PSP Cla ss ifi ca tio n
PP I D Proj ec te d Ut ili ty Lo ad
Relat ion_7529 RSEC WR Cla s sif ic ati on
Power Plan t ID [ 0, 1] Date I D
[ 0, 1] [ 0, 1] [ 0,[n]
0, n] CDA Cla ss ifi ca tio n
Power Sup pl ie r ID EC I D
Dist rib u tio nCo de Com p lia nc e Grid Co d e Co m pli an ce Relat ion_3880 Power Plan t ID
[ 0, 1]
Sub st at ion De tai ls Hi st ory Date I D Date I D [ 0, 1] [ 0, 1]
Con tra c ted Pe ak Dem a nd k W
Power Sup pl ie r Agree m en t
Surrog a te Su b sta ti on ID EC I D EC I D [ 0, n] With d ra wn Cap ac it y k W
EC I D Com p Grid ID
Sub st at ion I D (Se ri al No ) Com p Dist ID Con tra c ted En erg y M Wh
Power Plan t ID App lic a ble Pa ram Co un t [ 0, n]
Rate d Cap ac it y App lic a ble Pa ram Co un t With d ra wn Cap ac it y M Wh
Agre e m en t Sta rt Da te Circ ui t L in e Proje c tio n
Sub st at ion Ty pe Com p lia nc e Cou nt Com p lia nc e Cou nt
Agre e m en t En d Da te [ 0, n]
L oc at io n Stat us o f Co m pli an ce (De riv e d) Stat us o f Co m pli an ce (De riv e d) Date I D Relat ion_7700
ERC Cas e ID Com p lia nc e Ass es sm e n t (De riv ed ) [ 0, n] [ 0, 1] [ 0, 1]
Bran d Com p lia nc e Ass es sm e n t (De riv ed ) Relat ion_4060 [ 0, 1] EC I D
Con tra c ted Pe rio d
Own ersh ip Circ ui t L in e ID
Ann ua l Co nt ra cte d Ca p ac ity [ 0, n][ 0, n] [ 0, n]
Tran s fo rm er Unit R
[el
0,at1]ion_11417 [ 0, 1]
Circ ui t L in e va lu e
Ann ua l Co nt ra cte d En e rg y
Fee de r [ 0, n]
[ 0, 1] Relat ion_11418
Con ne c tio n Po in t [ 0, n]
Gen Set [ 0, 1] Relat ion_4058 Circ ui t L in e Ty pe
Disp a tc h Se qu en c e Relat ion_7532
KVA Rat ing Com p lia nc e Di strib uti on Cod e Com p lia nc e Grid Co de [ 0, n] Circ ui t L in e ID
Fue l Re qu ire m en t
In st al la tio n Da te Com p Dist ID Com p Grid ID Circ ui t L in e Ty pe
In st al le d Ca pa ci ty
Effe ct iv ity Dat e Title Title [ 0, 1] Cale n da r Dim e ns io n Start Da te
Net De p en da b le Ca pa c ity
Para m Cou n t Para m Cou n t Relat ion_4059 End Dat e
Net Prod uc ti on Cha r Da te ID
Relat ion_5839 Relat ion_11419 Cale n da r Da te
[ 0, 1] Con tra c ted De ma n d [ 0, 1] [ 0, n]
[ 0, 1]
[ 0, n] Relat ion_7531
Relat ion_4909 L oa d Fa ct or Full Nam e Cal en da r Da te
Com p lia nc e Grid Hi sto ry [ 0, n]
Con tra c ted En erg y Com p lia nc e Di strib uti on His to ry Day Nam e
[ 0, n] Surrog ra te Grid ID Day in We ek No Circ ui t L in e St ati st ics
[ 0, 1] [ 0, 1]
Surrog ra te Dis t ID
Com p Grid ID Day in M o nt h Relat ion_1593 Date [ 0, 1]
Com p Dist ID
Sub st at ion De tai ls Sub st at ion Sta tis ti cs Title [ 0, n] Wee k in M o nt h No EC L o ca tio n Relat ion_1592
Title Relat ion_1720
Sub st at ion I D (Se ri al No ) Para m Cou n t Wee k in Yea r No Circ ui t L in e ID
Date Para m Cou n t [ 0, n]
L oc at io n Effe ct iv ity Dat e M on th Nam e Circ ui t L in e Va lu e
EC I D Effe ct iv ity Dat e [ 0, n]
Bran d [ 0, 1] M on th No [ 0, n] [ 0, 1] M ON
Sub st at ion I D Relat ion_1594
Own ersh ip Relat ion_1677 Sub st at ion Ca pa ci ty Proj ec tio n Yea r M o nt h
Sou rc e Vo lta g e Pe ak
Tran s fo rm er Unit [ 0, n] [ 0, 1] M on th Ago
Sou rc e Vo lta g e Off Pe a k Date I D Relat ion_1679
Fee de r Yea r
Sec on d ary L in e Cu rre n t A EC I D
Gen Set Yea r Ag o
Sec on d ary L in e Cu rre n t B Proj ec ti on Typ e
KVA Rat ing Qua rte r
Sec on d ary L in e Cu rre n t C Tran s fo rm er Typ e
Stat us [ 0, 1] Qua rte r Ag o
Pea k No o f un its
In st al la tio n Da te Relat ion_1678 Sea so n
Power Fac to r
[ 0, n] Fisc a l Sta rt
L oa d Fa ct or
Fisc a l End
Perc e nt Lo a di ng
Table
Power Power Power Substation Circuit Circuit Projected Energy Distribution Grid Code
Substation System
Supply Supplier Supply Capacity Line Line Utility Input Code Comp-
Statistics Statistics
Forecast Agreement Statistics Projection Projection Statistics Load Statistics Compliance liance
Calendar x x x x x x x x x x x x
EC Profile x x x x x x x x x x x x
Location Details x x x x x x x x x x x x
Dimension
To p 1 0 Pro m p t Pa y o r Cu s to m e r
Po we r S u p p li e r Bi ll in g
NGCP Bi ll in g Da t e I D
Po we r S u p p li e r I D Relation_5696
Relation_7661
EC ID Cl a s s o fSe rv ic e Ty p e
[ 0, 1]
St a te m e n t Da t e ID EC ID [ 0, 1] Relation_11623 [ 0, 1]
Cl a s s o f Se rv i c e ID
Relation_5691 L o c a t io n I d [ 0, n]
[ 0, 1] EC ID Bi ll St a rt Da te Relation_5694 EC Pro f i le His t o ry Cl a s s o f Se rv i c e Ty p e Na m e
[ 0, n] Relatio[n_5693
0, n] Cl a s s o f Se rv i c e ID
Bi ll in g De t e rm i n a n t ID BI ll En d Da[ 0,t e1] [ 0, 1] Su rro g a te EC I D Rela[tio
0,
[ n_11622
0,1]n]
St a rt Da te
Cu s t o m e r Ac c o u n t No
Relation_5692 BI ll Re f No Bi ll De t e rm i n a n t I D Ca l e n d a r Di m e n s io n EC ID En d Da t e
[ 0, n] [ 0, 1] Cu s t o m e r Na m e
[ 0, n] BD Va lu e Bi ll Re f No Ch a r Da te ID EC Na m e No o f Da y s Be f o re De a d l in e
To t a l Ch a rg e s BD Va lu e Ca l e n d a r Da t e Grid Ty p e
Relation_7662 Am o u n t
Bi ll in g De t e rm i n a n t To t a l Ta x e s To t a l Ch a rg e s Fu l l Na m e Ca l e n d a r Da te Ef fe c t iv it y Da t e
Bi ll in g De t I D To t a l Ta x e s Da y Na m e Da t e o f In c
De t e rm i n a n t Na m e [ 0, n] Da y in W e e k No Da t e o f Firs t En e rg e n
Fi n a n c i a l Ch a rt o f Ac c o u n t s
De s c rip ti o n [ 0, n] Da y in M o n th
Ac c o u n t ID M e m b e rs h i p
[ 0, n] Ag g re g a t e d Fi n a n c i a l M e a s u re s
St a rt Da te W e e k i n M o n t h No Po we r S o u rc e
De s c rip ti o n
En d Da t e [ 0, n] RR
ela
elatio
tion_7634
n_778 W e e k i n Ye a r No Da t e I D
Fi n a n c i a l Gro u p in g [ 0, n] [ 0, n]
Relation_777 M o n th Na m e EC ID
Re p o rt Gro u p in g Ba l a n c e Sh e e t [ 0, n]
M o n th No De b t Se rv i c e
St a rt Da te Da t e I D [ 0, 1]
[ 0, 1] Ye a r M o n t h Relation_197 L i q u id i t y
En d Da t e [ 0, 1] EC L o c a t io n ID
Relation_4846 M o n th Ag o Ca s h Ge n e ra l Fu n d
Ac c o u n t Ty p e ID
Relation_13813 Ye a r [ 0, n]
[ 0, 1] Co n s u m e r Ac c Re c e i v a b l e s
Fi n a n c i a l Ch a rt o f Ac c o u n t s His t o ry [ 0, 1] Ac t u a ls [ 0, n]
[ 0, 1]
Ye a r Ag o [ 0, n] Re i n v e s t m e n t Fu n d
Su rro g a te Ac c o u n t I D Qu a rte r Ca s h Ad v a n c e
Ac c o u n t ID [ 0, n] [ 0, 1]
Relation_760 Qu a rte r Ag o No n Po we r Co s t
[ 0, 1]
De s c rip ti o n Se a s o n Co l le c t i o n Ef fi c i e n c y
[ 0, n] Relation_7686
Fi n a n c i a l Gro u p in g Fi s c a l St a rt Pric e In d e x As s e t T u rn o v e r
Re p o rt Gro u p in g I n c o m e a n d Ex p e n s e Bre a k d o wn
[ 0, 1] Fi s c a l En d Da t e I D Po we r A c c o u n t s Pa y a b le
Ef fe c t iv it y Da t e Da t e I D [ 0, n] [ 0, 1]
[ 0, 1]
[ 0, 1] EC ID EC ID
Un i v e rs a l Ch a rg e Relation_761 I te m I D
Ac c o u n t Ty p e ID [ 0, 1]
UC OR No [ 0, n] [ 0, 1] I te m Cl a s s i fi c a t io n
Relation_13812 Ac t u a ls Relation_199 [ 0, 1]
UC SBR No [ 0, 1] EC Pro f i le EC Un it Pri c e
Bu d g e t
[ 0, ID
EC n] NEA Un i t Pri c e [ 0, 1]
Relation_1453 Relation_7687
[ 0, 1] EC Na m[ 0,en] Relation_1456
[ 0, n] [ 0, n]
RFSC Ac c o u n t i n g Bu d g e t Ch a rt o f Ac c o u n t s Hi s t o ry [ 0, n] Grid Ty p e
Relation_1454
Su rro g a te COA ID Bu d g e t Ch a rt o f Ac c o u n t s St a rt Da te
Da t e I D [ 0, n] [ 0, n]En d Da t e [ 0, n]
EC ID COA ID [ 0, 1] [ 0, 1] COA ID [ 0, n] [ 0, n] [ 0, 1]
Ac c o u n t Sta t u s [ 0, n]
De s c rip ti o n De s c rip ti o n Relation_7636 Da t e o f In c Relation_4780
Be g i n n i n g Ba l a n c e Relation_4860 Po we r A c c o u n t s
Bu d g e t Gro u p i n g Ac c o u n t Sta t u s ID Da t e o f Firs t En e rg e n
Co l le c t i o n Bu d g e t Gro u p i n g Rel[a0,
tio1]
n_207 Da t e I D [ 0, n] [ 0, n] [ 0, n]
[ 0, n] De s c rip ti o n M e m b e rs h i p Relation_1455
Ef fe c t iv it y Da t e Relation_5695
Tra n s fe r o f Fu n d s [ 0, 1] EC ID Relation_1451
St a rt Da te [ 0, n] PSP Cla s s if ic a ti o n
Relation_7635
I n te re s t I n c o m e [ 0, 1] De l in q u e n t Co n s u m e rs
Ac c o u n t Sta t u s ID
En d Da t e RSEC W R Cl a s s i fi c a ti o n
Ad j u s tm e n t s Va l u e Da t e I D
CDA Cla s s if ic a ti o n Ex p e n d it u re s
Di s b u rs e m e n t s EC ID
[ 0, 1] Da t e I D
[ 0, n] Relation_814[ 0, n] Cl a s s o f Se rv[ 0,i 1]
c e ID
Relation_3959 EC ID
Ac c o u n t No[ 0, 1]
Relation_3960 Ex p e n s e Ty p e I D
[ 0, n] Ac c o u n t Sta t u s
Ex p e n s e Va l u e
Ac c o u n t Na m e
Bu d g e t Pe rf St a t is t ic s [ 0, n] No o f Bi ll s
[ 0, n]
Da t e I D Pe n a l ty Cre d it o r Pro fi le Hi s to ry
EC ID [ 0, 1] Bi ll e d A m o u n t Su rro g a te Cre d it o r ID
Relation_1452
[ 0, 1]
Relation_733 Ac c o u n t Ty p e ID L o c a t io n
[ 0, De
1] t a i ls Cre d it o r I D
Relation_734 Cre d it o r Pro fi le
Bu d g e t [ 0, 1]
Cre d it o r Na m e
Ba ra n g a y ID [ 0, n] Cre d it o r I D
Ac t u a ls De s c rip ti o n
I n c o m e Cl a s s ID Am o rt iz a ti o n Du e Cre d it o r Na m e Relation_4830
Cre d it o r Ty p e
Di s tric t Da t e I D De s c rip ti o n
[R
0,ela1]tion_826 Relation_840 [ 0, n] Ef fe c t iv it y Da t e
Ci ty EC ID Cre d it o r Ty p e
L o c a t io n De t a i ls His t o ry EC Ge o g ra p h y
Pro v in c e Relation_1031 Relation_1457
[ 0, 1] Cre d it o r I D
[ 0, n]
Ba ra n g a y ID Re g i o n EC ID [ 0, 1]
[ 0,
Rel1]
ation_1030 Cre d it o r Na m e
Di s tric t Relati[o0,n_4798
1] I s la n d Gro u p
[ 0, 1] Ba ra n g a y ID
Am o u n t d u e
Ci ty [ 0, n] St a rt Da te L o a n Ty p e
L o a n Ty p e ID
Pro v in c e En d Da t e L o a n Ty p e ID
Re g i o n Su s c e p ti b il it y to Ty p h o o n [ 0, 1] [ 0, n]
L o a n Ty p e Na m e
I s la n d Gro u p Urb a n Ru ra l Cl a s s i fi c a t io n Relation_11634 De s c rip ti o n
Ef fe c t iv it y Da t e Po p u l a t io n St a rt Da te
Pe r Ca p it a I n c o m e En d Da t e
L o c a t i o n De t a i l s
B a ra n g a y I D
I n c o m e Cl a s s I D
Di s t ri c t
E m p l o y e e M a s t e rl i s t B OD P ro f i l e Ci t y
S u m m a ry o f Co m p l a i n t s Relat ion_5720 P ro v i n c e
T IN T IN [ 0, 1]
Na m e Da t e I D E C Ge o g ra p h y Relat ion_1031 Re g i o n
Em p l o y m e n t T y p e L o c a t i o n De t a i l s Hi s t o ry
Po s i ti o n E C I D [ 0, 1] [ 0, n] I s l a n d Gro u p P a t ro n a g e Cre d i t Re f u n d
Po s i ti o n T y p e EC ID [ 0, n] Relat ion_4798 B a ra n g a y I D
Co m p l a i n t T y p e I D S t a rt Da t e Cre d i t Re l e a s e Da t e I D
Em p l o y m e n t Sta tu s Di s t ri c t B a ra n g a y I D [ 0, n] [ 0, 1] Di s t ri c t
Co n t a c t I n f o Co m p l a i n t S t a t u s R ela t o
i n_6102 E n d Da t e EC ID
E m p l o y e e Na m e Ci t [ 0, 1]
y
Co m p l a i n t Co u n t Rela[[t 0,
ion_1030
1] Su s c e p ti b i l i ty to T y p h o o n F o rm u l a
Da t e o f B i rt h Ca n d i d a t e i n t h e L a s t E l e c t i o n 0, n]
P ro v i n c e [ 0, 1]
E l e c t i o n P o s i t i o n Rela t o
i n_639 Re m a rk s E C P ro f i l e Urb a n Ru ra l Cl a s s i f i c a t i o n Re c i p i e n t Co u n t
E m p l o y e e Co n t a c t I n f o [ 0, n] Re g i o n
E C I D Po p u l a ti o n I n s t i t u t i o n a l M e a s u re T o ta l Am o u n t
Hi g h e s t L e v e l o f E d u cR[ela0, att1]
ioi n_6290
o Da t e o f L a s t P re c e d i n g E l e c t i o n
[ 0,nn] I s l a n d Gro u p
Da t e S t a rt [ 0, n] E C Na m e P e r Ca p i t a I n c o m e Da t e I D
De g re e Relat ion_6126 E f f e c t i v i t y Da t e
Hi re Da t e Da t e E n d B OD P o we r o f A c c o u[ n0, tn]s P a y a b l e Gri d T y p e EC L o c a ti o n ID Relat ion_6103
Relat ion_6008 Relat ion_6046
E n d Da t e T e rm o f Of f i c e (d e ri v e d ) Relat ion_641 Da t e I D S t a rt Da t e [ 0, n]
[ 0, 1]
E[ C0, n]Ra t i n g
Relat ion_6082 [ 0, n] [ 0, n] E C Cl a s s i f i c a t i o n I n c o m e Cl a s s i f i c a t i o n
E m p l o y e e Re a s o n f o r E n d No o f Y e a rs o f S e rv i c e EC L o c a ti o n ID E n d Da t e
[ 0, 1] [ 0, 1] [ 0, n] I n c o m e Cl a s s I D
P o s i t i o n Re m a rk s Go o d M o ra l Ch a r Do c u m e n t [ 0, 1] T IN Relat ion_5943 Da t e o f I n c Relat ion_1458 [ 0, n] B OD Ra t i n g
Relat ion_1462
[ 0, n] Cl a s s Na m e
Ra n k M e m b e r o f Go o d S t a n d i n g A c c o u n t [ 0, S 1]ta tu s Da t e o f F i rs t[ 0, E n]
n e rg e n GM Ra t i n g
[ 0, 1] De s c ri p t i o n
S a l a ry W i t h S p o u s e Ho l d i n g Hi g h e r E l e c t i v e Ac c o u n t Am o u n t M e m b e rs h i p [ 0, n]Relat ion_8889 E m p Rleloatyion_1459 e e Co u n t (De ri v e d )
T e rm i n a t e d f ro m P re v i o u s E m p l o y m e n t Ca s h A d v a n c e S t a t u s P S P Cl a s s i f i c a t i o n [ 0, n] M e m b e r Co n s u m e r Co u n t Da t e S t a rt
4 t h De g re e o f A f f i n i t y Co m p l a i n t T y p e Ca s h A d v a n c e A m o u n t RS E C W R Cl a s s i f i c a t i o n E s t i m a t e d A n n u a l Re t i re e s Da t e E n d
[ 0, 1] V o t e r' s T u rn o u t Co m p l a i n t T y p e I[ D 0, 1] Rela[t[0,
io0,n_4780
n] CDA Cl a s s i f i c a t i o n
1] E s t i m a t e d M o n t h l y Re t i re e s
[ 0, 1] Relat ion_6273 No o f V o t e rs Co m p l a i n t Na m e E C P ro f i l e Hi s t o ry Re t i re m e n t F u n d
De s c ri p t i o n [ 0, n] Fund M anager
F i n a n c i a l I n t e re s t Relat ion_5719 S u rro g a t e E C I D Ca l e n d a r Di m e n s i o n [ 0, 1] I n f o E d u c a t i o n Ca m p a i g n
[ 0, n] Da t e S t a rt EC ID [ 0, n] F u l l T i m e Eq u i v a l e n t
[ 0, 1] Ch a r Da t e I D Da t e I D
Da t e E n d E C Na m e [ 0, 1]
Relat ion_6274 [ 0, 1] Ca l e n [d0,an][r0,Da n] t e Relat ion_198
[ 0, 1] EC ID
Em p l o y m e n t Sta tu s Gri d T y p e
F u l l Na Rel
[ 0, n]
mat ioen_5761 Ca l e n d a r Da t e E C P ro g ra m
Em p l o y m e n t Sta tu s T y p e E f f e c t i v i t[y0, n] Da t e [ 0, n] Relat ion_5760
[ 0, n] Relat ion_5721
Da y Na m e M e d i a In fo
De s c ri p t i o n Da t e o f I n c B OD A c t i o n s S t a t u s A u d i t Ra t i n g
B OD A t t e n d a n c e S t a t Da y i n W e e k No B OD A c t i o n T y p e P ro g ra m S c h e d u l e
Da t e S t a rt Da t e o f F i rs t E n e rg e n [ 0, n] Da t e I D Co v e ra g e Da t e
Da t e I D Da y i n M o[ 0, n n]th Ac ti o n ID
E m p l o y m e n t Cl a s s i f i c a t i o n [ 0, n] Da t e E n d M e m b e rs h i p E C I D EC ID
[ 0, n] EC ID W e e k i n M o n t h No [ 0, 1] A c t i o n De s c ri p t i o n
E m p l o y m e n t Cl a s s T y p e Relat ion_642 P[o0,we 1] r S o u rc e [ 0, 1] [ 0, 1] Ac ti o n T y p e ID Au d i t T y p e
[ 0, 1] T IN W e e kRelai tnRioeln_1460 aY t ioen_1463
a r No Da t e S t a rt
De s c ri p t i o n Relat ion_6275 [ 0, n] Rel[a0,
t[ io0,
1] n]
n_667 Re p o rt P u b l i s h Da t e
M e e ti n g T y p e M o n t h Na m e Co u n t Da t e E n d [ 0, 1]
Da t e S t a rt [ 0, n] [ 0, n] Relat ion_666 A u d i t Ra t i n g
Da y s P re s e n t Relat ion_643 M o n t h No [ 0, n] [ 0, 1] Relat ion_6140
Da t e E n d Un i o n A s s o c i a t i o n L i s t Hi s t o ry E x i t Co n f e re n c e Da t e
[ 0, n] Da y s A b s e n t [ 0, 1][ 0, 1] Y e a r M o n t h[ 0, n] [ 0, n]
[ 0, n]
S a l a ry Ce i l i n g Un i o n I D M e e ti n g T y p e R ela t o
i n_6081
[ 0, n] M o n th Ag o [ 0, 1] A u d i t o r Na m e
R ela t o
i n_6141 [ 0, n]
S u rro g a t e Un i o n I D M e e ti n g ID Relat ion_640 Ye a r [ 0, n] Relat ion_202 A u d i t Cl a s s i f i c a t i o n
Un i o n A s s o c i a t i o n Na m e [ 0, 1] Co m p l i a n c e
De s c ri p t i o n Ye a r Ag o Cu s tRoelam e r S e rv i c e S t a n d a rd
t ion_5870
Affi l i a ti o n [ 0, n] Au d i t F i n d i n g s
Da t e S t a rt Qu a rt e r Cu s t o m e r S e rv i c e S t a t i s t i c s Cu s t o m e r S e rv i c e P a ra m e t e r I D
Da t e E s t a b l i s h e d Relat io[n_205
0, 1]
Da t e E n d Qu a rt e r A g o Da t e I D S t a n d a rd
A d d re s s [ 0, 1] Se a s o n EC ID [ 0, n]
[ 0, 1]
S t a rt Da t e
[ 0, n] Co n t a c t I n f o o f Un i o n P re s i d e n t F i s c a l S t a rt Co m p l i a n c e [ 0, 1] B A P A De t a i l s
E n d Da t e
E f f e c t i v i t y Da t e F i s c a l En d Da t e I D
[ 0, 1]
EC ID
[ 0, 1] B A P A Org a n i z e d Co u n t
Relat ion_5871
[ 0, n] A c c i d e n t De t a i l s Op e ra t i o n a l B A P A Co u n t
[ 0, 1] Un i o n A s s o c i a t i o n L i s t CB A [ 0, n] [ 0, 1]
A c c i d e n t Da t e M e m b e r Co u n t
Po s i ti o n T y p e Un i o n A s s o c i a t i o n I D Un i o n I D [ 0, 1] [ 0, n] Relat ion_6006 Relat ion_6005 E q u i p m e n t T y p e
[ 0, 1] [ 0, 1]
EC ID
Po s i ti o n T y p e ID Un i o n A s s o c i a t i o n Na m e [ 0, n] A g re e m e n t Da t e I D Relat ion_6007 Eq u i p m e n t ID
[ 0, n]
Ac c i d e n t T y p e ID [ 0, n]
De s c ri p t i o n Relat ion_5963 Affi l i a ti o n EC ID [ 0, 1] De s c ri p t i o n
Relat ion_5941 [ 0,[[0,
n]0,Rn]
el
n]at ion_5942 [ 0, n]
Eq u i p m e n t T y p e ID M SEAC o r Eq u i v a l e n t
Da t e S t a rt Da t e E s t a b l i s h e d A GM A Da t e S t a rt Da t e
[ 0, 1] [ 0, n] Em p l o y e e ID Da t e o f A p p o i n t m e n t
Da t e E n d A d d re s s E c o n o m i c B e n e f i t s [ 0, 1] E n d Da t e
Relat ion_7701 Ou t s o u rc e E m p l o y e e I n v o l v e d EC ID
Co n t a c t I n f o o f Un i o n P re s i d e n t Am o u n t [ 0, 1] M SEAC Se c to r
Relat ion_6313 Ac c i d e n t T y p e Co n s u m e r I n v o l v e d Se c to r ID
A c c i d e n t I D A c c i d e n t De s c ri p t i o n [ 0, 1]
B o a rd Re s o l u t i o n No Se c to r ID
Relat ion_5899
De s c ri p t i o n Da m a g e E x t e n t [ 0, 1] Na m e Rela[[t 0,
0, n]
1]
ion_5898 De s c ri p t i o n
L a b o r M g t Is s u e s Relat ion_5900 S t a rt Da t e
B o a rd Re s o l u t i o n s L a b o r Is s u e T y p e S t a rt Da t e Da m a g e Co s t T e rm o f Of f i c e
I s s u e F i l i n g Da t e I D Ac ti o n T a k e n E n d Da t e
EC ID Is s u e T y p e ID E n d Da t e [ 0, 1]
CS R Ac ti v i ty T a k e n
B y L a ws A m e n d m e n t EC ID
Re s o l u t i o n No De s c ri p t i o n Da t e I D A p p ro v e d p e r Di e m s
S u b m i s s i o n Da Is s u e T y p e ID
Re s o l u t i o n Da t e [ 0, t1]e I D Da t e S t a rt Relat ion_7565 F e d e ra t e d (De ri v e d )
Da t e A p p ro v a l I D 0, n] Co n c e rn De s c ri p t i o n Relat ion_7566 EC ID
Re s o l u t i o n T i t l e Da t e E n d R[el0,
at 1]
io[n_6080
EC ID [ 0, n] [ 0, 1] Sta tu s CS R P ro j e c t T y p e CS R P ro j e c t T y p e
NE A A c t i o n [ 0, n] [ 0, 1] Relat ion_6125 [ 0, 1]
B o a rd Re s o l u t i o n No
B o a rd Re s o[ l0,u[n]0, t i 1]
o n No Re m a rk s RRelelaattioion_6045 CS R T y p e I D
Re s o l u t i o n Cl a s s i f i c a t i o n 1 Relat ion_7568 n_7567
[ 0, n] P ro j e c t Na m e Ca p a c i t y B u i l d i n g
A GM A Re s o l u t i o n P ro j e c t T y p e
Re s o l u t i o n Cl a s s i f i c a t i o n 2 Relat ion_7564 S e m i n a r Da t e I D
Re s o l u t i o n Cl a s s i f i c a t i o n 3
A p p ro v a l S t a t u s P ro j e c t De s c ri p t i oRelnat ion_6044 P ro j e c t De s c ri p t i o n EC ID
Relelaattioion_6213
n_6214 [ 0, 1] [ 0, 1] S t a rt Da t e
[ 0, 1]
[ 0, 1] B e n e f i c i a ry Co u n t
Re s o l u t i o n Re m a rk s R P a rt i c i p a n t E m p I D
Relat ion_7702 P ro j e c t Co s t
E n d Da t e T ra i n i n g Na m e
E I CP M a p p ro v e d
Da m a g e E x t e n t S p o n s o ri n g A g e n c y
Da m a g e Co s t
Ac ti o n T a k e n
Table
BOD
BOD Board Customer By-Laws Info Patronage
Institutional Employee Power of Summary of Labor Mgt Accident Audit Capacity MSEAC or BAPA
Attendance Resol Service CBA Amendm Education CSR Credit /
Measures Masterlist* Accounts Complaints Issues Details Rating Building Equivalent Details
Stat utions Statistics ent Campaign Refund
Payable
Calendar x x x x x x x x x x x x x x x x x
EC Profile x x x x x x x x x x x x x x x x x
Location Details x x x x x x x x x x x x x x x x x
Employee Masterlist* x x x x
Employee Position Type x
Dimension
Employee Status x
BOD Profile x x x x x x
BOD Meeting Type x
Complaint Type x x x
Board Resolution Classification x x x x
Labor Issue Type x
Accident Type x
Equipment Type x
*Both a dimension and a table
Table
Funding Project
Project Project
Allocation Energization Price Index
Masterlist Accomplishment
Details Coverage
Calendar x x x x x
EC Profile x x x x x
Dimension
Location Details x x x x x
Project Type x x
Project Funding Source x x x x
Project Impact Type x
Project Completion Status x x x x
9
For details on the BI Analysis items, see Discovery Report Section 5.1 Recommendations on Effectiveness
10
On inquiries with NEA and ECs, data on input and output (kWh) per feeder, consequently, system loss data per feeder, will be difficult
for some ECs to provide. Given this, it is recommended to do a phased implementation wherein the first phase will include
implementing the system (data architecture, system configurations including formula and dashboards displaying system loss data per
feeder) that can accommodate the per feeder data. However, the data entry template and the Web Portal will not require the per
feeder data. At the end of this phase, any report or dashboard supposed to display system loss per feeder is implemented but will not
show any figures due to lack of data. At a later phase, when all the ECs are ready to provide the per feeder data, the change will be
limited to a revision in the data entry template and data validations to be done by the Web Portal; no changes required in the data
architecture, formula and dashboards.
For key outputs, the NEA IT System, at the minimum, should be able to generate all of the existing reports
included in the reportorial requirements, those required by other agencies as well as those shared with the
public.
Highlighting that the primary objective of NEA is to enable ECs to achieve Total Electrification and
strengthen its sustainability through financial viability and technical proficiency, mainly through policies,
programs and performance monitoring, NEA should be able to effectively analyze information. To strengthen
NEA’s analysis capabilities, the NEA IT System should be able to generate dashboards displaying the BI
Analysis items identified in the Discovery Phase. These dashboards will enable NEA to perform analysis of
trends, with a portfolio view of all ECs or groups of ECs, rather than on an individual basis, dynamic
information (non-static, unlike reports) to facilitate ease of investigation and comparison across multiple sets
of information. The dashboards should also be intuitive so that users may be able to build and test their own
measures and performance metrics in the form of charts, graphs and other graphics most effective in
representing information and trends.
Below are the sample output dashboards recommended for NEA:
Figure 13 shows a pop-out window after clicking the Collection Efficiency bar in Figure 12 to show a similar
bar graph but considering only the ECs (34% out of the 120) that did not meet the Collection Efficiency
performance indicator, and out of that statistic, what percentage of those ECs did not meet other
performance indicators.
The above dashboards are composed of measures currently monitored by NEA and the BI Analysis items
identified in the Discovery Report. All data required to generate these dashboards are incorporated in the
Data Model, Data Dictionary, as well as the Data Entry templates. It must be noted that the dashboards and
its figures are samples and are for illustration purposes only. It is expected that the system implementor will
further elaborate on the complete list of dashboards needed as part of their detailed technical specification.
Element Description
Term The name of the term such as “Class of Service” or “System Loss”
Description, Business The description of the term, any business rules related to the term, the formula
Rules, Formula, Source if the term is to be derived from other data in the system, and other relevant
information to provide context to the term. The source of the definition,
business rules or formula is also included. For example, “Memo 2011-016” or
“RA 9136 Section 34”
Technical Specifications
of the Term
Data Format The format of the term if it is alphanumeric, numeric, date (mm/dd/yyyy or
mm/yyyy) or time.
Dimension/ A data classification if the term is a dimension, a measure or an attribute.
Attribute/
Measure Dimensions give meaning to an occurrence or transaction. For NEA,
dimensions include “Class of Service” (Residential, Commercial,
Industrial and so on) and “Loan Status” (Current, Restructured, In
Arrears). Dimensions may have a hierarchy: for example, Geography
(Island Group, then Regions, then Provinces and so on)
Attributes give additional meaning to a dimension. By itself, an attribute
will not provide much information. It needs to be associated with a
dimension to have effective meaning. For NEA, attributes include
“Count of Connections” which may be associated with dimensions
Class of Service or Geography or both. Another example of an
attribute is “Start Date: which can be associated with dimensions
“Employees”, “Interruption” or “Project”.
12
Measures are transactional or operational occurrences that are
quantitative in nature. For NEA, measures include “Input Energy” and
“Average Annual Growth Rate”.
Data Governance is the “organizational bodies, rules, decision rights, and accountabilities of people and
14
information systems as they perform information-related processes” . This involves establishing a set of
policies and procedures aimed at ensuring the integrity of data stored in the database to manage end-to-end
data quality. Data Governance is important especially for organizations implementing enterprise-wide
information systems such as a BI System, primarily because data will be coming from different sources,
centrally stored in an integrated database system, and consumed/used by different personnel internal and
external to the organization. Data Governance is important as it will ensure that controls are in place to
maintain the quality of data used by the data consumers.
This section will discuss the data governance processes necessary to maintain data integrity at NEA when
the NEA IT System is implemented.
Data Maintenance Process for changing the data model, templates, master data and data
configuration due to changes triggered by events such as new or
updated policies or regulations and new BI analysis opportunities
13
Described in Section 3.5.2.
14
As defined by The Data Governance Institute
Master Data Maintenance Process for changing (add, modify, delete) the list of valid values for
certain data entities (e.g. substation, employees, BOD, etc.) that will be
used to verify the data entered in templates and/or uploading of
uploaded in the system
Template Maintenance Process for updating the templates used by the ECs in entering
reportorial data for upload into the system
Data Upload – Standard Process for uploading accomplished reports (e.g. equivalent reports for
MFSR, MER, MIR, audit findings) to the system on a periodic basis
under normal circumstances.
Data Upload – Special Handling Process for uploading reports to the system that could not be
performed through the “Data Upload (Standard)” process due to special
circumstances (e.g. unreliable internet connection in the EC’s area,
template has not been completed/uploaded in time for the defined
report submission cut-off date, system in unavailable, data errors that
require investigation by the Data Governance Team, etc.)
NEA Data Approval Process for approving the data content uploaded either through “Data
Upload (Standard)” or “Data Upload (Special Handling)” process to
ensure high quality of data to be stored into the database. This is an
optional process which will have to be agreed upon during the system
implementation phase.
Data Warehouse Processing Batch processes that perform ETL of approved data, storage of data
into the database as well as generate reports and dashboards.
These processes are typically defined by the system implementor as part of the detailed functional/technical
specification phase. However, for the purpose of illustrating what these processes contain, sample data
maintenance processes (as specified above) which are relevant to the BI System are shown in Annex 6.3.
This can serve as the basis for the processes which can be refined and progressively elaborated by the
system implementor during the implementation phase
As part of Data Governance, organizations accountable for data integrity have to be defined. In particular,
Data Owners (sometimes referred to as Data Stewards) and Data Custodians have to be designated for the
sets of EC-related data collected and stored by NEA.
Data Owners are resources responsible for the content, context and business rules regarding data. They are
responsible for the data stored in a data field. As such, data owners should have the knowledge,
responsibility and authority to describe, establish and enforce business rules pertaining to the data. In
summary, the main responsibilities of the data owners include:
Establishment of business rules pertinent to data
Definition of business requirements and context that will serve as input to the definition of the Data
Architecture (i.e. data model, data dictionary)
Determination of access rights for data within their ownership
Decision on the quality of data stored in the database
On the other hand, Data Custodians are responsible for the maintenance, transfer, and storage of data. They
are responsible for the fields that store the data, the information systems that manage the data, and the
implementation of business rules pertaining to data management. Thus, the main responsibilities of the data
custodian include:
The data models discussed in Section 3.2 list the data needed by NEA. The Data Owners for Financial data
such as expenditures, power supplier billing, amortization due, etc. could be those from the Financial
Services and/or Accounts Management and Guarantee Departments. The Data Owners for Technical,
Institutional and Project data could be from the ED, IDD and Corplan, respectively. It should be noted that it
is not necessary that an entire subject area should be assigned to a single department for Data Ownership. It
may be more effective for some data within a subject area to be assigned to personnel from another
department.
These roles are recommended to be permanently upheld by NEA to ensure that there are persons assigned
to ensure data alignment and integrity at all times. This is not a full time assignment and tasks related to data
governance are not expected to occur all day, 5 days a week. Rather, it is an additional responsibility that
could be assigned to a person or group of persons (Data Governance Team) over a period of time then
transferred to others of the same subject matter expertise, as necessary.
In using a new BI system, the presence of some historical data is preferred as it will allow users to perform
historical and trend analysis immediately upon implementation. It is ideal to have this completed prior to BI
Implementation. However, this should not be treated as a pre-requisite to system implementation especially
if schedule slips due to data conversion of historical record or due to unavailability of quality historical
records. The BI System will still operate without historical record and will still provide some BI analysis
particularly those that compare ECs using data within the current period, but trends and analysis based on
historical data will not be possible.
Important factors in preparing historical data are:
(1) The "cleanliness" of data, which refers to the uniformity in the format of data (i.e., number of decimal
places, character length, etc.) and its completeness such that all fields in the destination system will be
populated and not left blank.
(2) A decision on how much historical data could be made available and in encoded in the system. Note that
a minimum of a year's worth of data would be sufficient when viewing data on a monthly level of detail. Older
data could be considered though five years of data may entail too much manpower to retrieve, cleanse and
encode all 120 ECs' monthly data.
For the historical data upload, it is necessary to create a data team from NEA to be responsible for planning
and preparing the procedures for making the historical data available to be loaded into the system. The data
team shall collect historical data from its files/archives, perform the necessary data cleansing and data
quality validation, and encode them in structured templates to enter the data into the system. Then a batch
process could be executed to upload the cleansed data in populated templates to the system.
15
To avoid duplication, the BI system's output may be published or made public through the NEA Website.
BI Technology Components
Data Business
Warehouse Intelligence
Layer
Relational • Database access
Database • Audit user activities
• Secure and Control
• Predictive Models
Data • Historical Data
Data Model and Analysis
Integration
• Custom search and
filters
• Charts, Graphs &
other Analytics
ETL
Integration
Metadata
Extract,
Data Entry Analyze, Publish &
Transform Query & Mine
Web Portal Share
& Load
The diagram presents three (3) major components. The first component is the data integration layer, also
known as the ETL component. As the first layer, it is responsible for the collection of raw data. The data
then undergoes a transformation process (i.e., calculations, string manipulation, setting of default values,
logical operations, merging of data sets etc.) through the application of business rules to make the data fit for
end user consumption. The processed data is loaded and stored into the data warehouse.
The Data Warehouse is the second major component. It is at this layer where data is organized according to
a data model that promotes a complete and unified view of consolidated data based on the reporting and
analytical requirements of the organization.
To fully realize the benefit of the Data Warehouse, it is necessary to implement the third component of the
system – which is BI. This layer is designed to be the user-interfacing layer composed of tools and functions
to facilitate data analysis, simulations, visualization and reports preparation. Through these tools, users can
create and view various graphs, charts, perform geographical analysis, etc. The output from this layer is
what can be published and distributed to an organization's stakeholders.
BI System Component
Functionality
/ Capability
ETL Layer
Flexibility The design of the ETL processes must be flexible to handle change in business
rules, data source connections, new data elements, report requirements, new
formats of source files, additional aggregation details, etc.
All pre-built transformations can be configured to allow organization specific
conditions.
Capacity ETL must be able to apply both bulk and incremental data updates.
Scheduling The ETL jobs can be scheduled based on availability of data sources or other
conditions/events.
Monitoring The ETL tool must have an intuitive interface to monitor the execution of the
jobs from which logs can be accessed and from which jobs can be restarted at
certain checkpoints.
Business Intelligence Layer
System Capabilities
Reporting Enables the creation of formatted and interactive reports.
Interactive reporting enables users to create, display and save prompts
that filter the data and the layout of the report;
Formatted reports are familiar and easy to use;
Allows offline mode for users with limited internet access; Allows for navigation
and search of information in the report and serves as a repository of reports.
Allows versioning of reports.
Dashboards End users must be able to build their own performance metrics in the form of
charts, graphs, buttons and other graphics.
Ad Hoc Query Enables the users to enter and execute a query for retrieving information,
calculations and filters in a business-friendly universal layer, without the need for
programming.
Online Analytical Allows end users to analyze data with extremely fast query and calculation
Processing (OLAP) performance; Can perform sophisticated sorting/ranking, alternate hierarchies,
calculations and drill down on measures.
Visualization Tools Allows numerous aspects of data to be displayed more efficiently by using
interactive pictures, graphs and charts.
User Experience User-friendly intuitive interface that is easy to navigate and explore.
System Features
Web Portal Access Ability to publish and organize the BI objects into a web-based interface.
Connectivity with other Capability to integrate with different data sources such as Relational Databases,
databases OLAP Data Sources and Flat Files.
Scheduling Automatic update of reports and dashboards to reflect changes to metrics based
on schedules and/or events, new data.
Administration Features
BI Infrastructure Can deploy all BI functionalities from a single installation with emphasis on
common security, metadata, administration, integration, data model, query
engine and interface.
Metadata Management Can accommodate various types of BI metadata, including author, dates, etc.;
Includes the feature to search and the ability to promote and reuse metadata
across different users, developers and application types for coherence in data
identification.
Logs changes to metadata including user involved, time and date of change,
etc.
Security Can secure and control access to data, the different BI objects and the modules
of the BI application.
Logs changes to security settings including user involved, time and date of
change, etc.
Auditing Can assign and track events or tasks performed by the systems and/or users
and administrators.
The user perspective of having these functional requirements is presented in Annexes 6.4 and 6.5 through
use case diagrams and user stories.
Tried and tested reliable solutions usually The investment may be limited to support and
with a global-wide reach. documentation since there are no software
Advantages
Up-front and maintenance costs are generally Many open source vendors charge for other
higher. features such as support services, access to
Due to a huge client base, there may be codes that have been enhanced for specific
competition for support availability. requirements, and extensions.
Need for skilled developers and staff to
implement and maintain the system.
Generally, their user interfaces are less
appealing to business users, hence will get
less buy-in from the users.
Disadvantages
and exceptional performance and richer software vendor for support and issues resolution.
functionalities available for each BI They generally tend to have overall lower software
component. license costs as the vendors are able to offer
Not tied to an enterprise application packaged solutions containing multiple products.
stack. System interfaces are well thought out in the
design.
Separate brand solutions per BI Product development may not be as robust and
component results in separate support aggressive as independent providers as overall
and maintenance skills required. company spending is distributed across other
May need several vendors for support. offerings (i.e. ERP, CRM software).
Total software license costs generally
Disadvantages
This categorization must not at all serve as a hindrance from getting a combination of solutions from either
category. Integration is very much possible between solutions of both categories, and depending on an
organization's needs, could be the recommended approach.
For NEA, since this will be a first major system implementation, a generally simpler end-to-end solution
would be an ideal initial step. Then, as the organization and its needs grow, best of breed solutions may be
chosen to upgrade the initial setup to incorporate special system features.
Commercial Microstrategy x x
"Best of Breed" Tableau x
Qlik x
Microsoft x x x x
Commercial SAP x x x x
"End to End"
(DB-ETL-BI) Oracle x x x
IBM x x x
Pentaho x x
Open Source
Jaspersoft x x
BI skills not required, user friendly. Its UI Limited product line focused on data
is intuitive, with drag and drop features discovery.
allowing non-technical resources to easily Weak in traditional analysis, metadata
use it. management, BI platform administration.
Analytic dashboards, free-form Tableau Server has a scalability issue:
exploration, business-user data mash up working with a large data set is not that
and cloud deployment are platform fast.
strengths. Does not support functionality for
Data synchronization is seamless. scheduling or notification of reports.
Supports fast connection to multiple data
sources (database, Excel, text files, etc.)
in one click
Easy to generate fairly complex reports
that supports interactive visualizations
and decision support for quick analysis in
an intuitive, drag and drop manner.
Supports mobile deployment.
Comprehensive online resources
available.
Market leader in data discovery. Limited in performing traditional analysis.
Known for ease of use. Need for skilled developers to develop
Low implementation time and effort. dashboard applications. Qlik utilizes
Has a large online community. proprietary SQL for database queries.
Has a robust mobile application. Hence, end users will have difficulty
creating dashboards and ad-hoc reports
without support from IT.
Based on a survey done by Gartner, Qlik
has a below than average rating for
customer support.
Offers end-to-end BI solution, including Does not normally offer the BI tools as a
Oracle Data Integrator for ETL, Oracle packaged solution.
BIEE for the BI layer, Oracle DB and Costly licenses.
Exadata for the Data Warehouse. Needs improvement in terms of customer
Supports large-scale enterprise-wide BI experience. Based on a Gartner survey,
implementation. most notable concerns are on the area of
Strong in traditional analysis. usability, difficulty in development and
OBIEE is a complete solution. It provides administration, and quality of support.
Business Intelligence tools for reporting, Low scores in self-service usability.
analysis, ETL and a database to serve as
a Data Warehouse.
Features a powerful analytics tool without
the need for SQL or database table
knowledge.
Can support complex reporting
requirements.
The web portal is an application designed to support and manage the collection and validation of data
between the ECs and NEA. It will be on the web for accessibility of the ECs regardless of location and could
accommodate the following activities to be done by the corresponding user:
Process/Capability Functionality
User Management
User Access User types are maintainable.
User profile and access types are maintainable.
Log In/Out Allow users to log in/out of the system.
Allows password administration.
Data Collection
Notifications
Alerts and Email Can set up email notifications to provide users with reminders on
portal activity such as a submission, approval, etc.
Data Inquiry and Viewing
Reporting Consolidates various usage statistics into reports such as:
EC submissions as of date
Trend of EC submissions in the past 6 months
Allows NEA users to create simple reports on usage and
submission statistics.
Ad Hoc Query Enables the users to enter and execute a query for retrieving
uploaded data through a business-friendly universal layer, without
the need for programming.
Download Allows users to download the submitted templates into MS Excel
files.
Approval and Comments
Approval and Comments Enables NEA users to approve data submitted by the ECs and add
comments on approval/disapproval.
Tags approved data as available for ETL.
Interfacing
Links Can accommodate the links to other websites such as the NEA
website and the web location of specific BI output (reports,
dashboards, etc.)
w/ BI system Allows data access to BI system for capture of approved data for
ETL.
System Administration
Scheduling Allows an administrator to manage/set up the deadline of
submission for every reporting period.
16
It is highly recommended that a standard format be established and complied with to ensure streamlined development and that files
accomplished and submitted to the portal are always valid.
As of this Design Report, NEA is undergoing user acceptance tests for OURS, an online web-based system
intended for use of the ECs in submitting their monthly requirements. OURS is considered as an overlap with
the web portal system, as they both function as a data capture system. In addition, the following issues on
OURS' implementation are summarized below:
1) As a data capture facility, the design of OURS must include the additional data and granularity
requirements according to the data models prepared for this IT design. The data entry templates (Section
3.1) and data dictionary (Section 3.4) illustrate the specific data entities and granularity required.
2) OURS should be able to easily reconfigure its database and data entry screens to be able to address the
additional data and data granularity needed to support identified and future BI analysis.
3) Additional development on OURS will be necessary to generate the file(s) that will pass on data to the BI
system.
4) OURS must be able to support offline submission/uploading of reports to ensure that ECs with internet
connectivity issues are still able to submit complete data by the set timelines. If not, NEA should be able to
support those ECs. Apart from this, OURS must be able to support the other functions envisioned for the
web portal such as the validation and approval of key data submitted to NEA and publishing of BI generated
reports, etc. as discussed in Annex 6.5 User Stories.
5) As subscription payments are required for an EC to be able to use OURS, NEA should be able to manage
the risk of some ECs who might be unable or opt not to pay for those subscription payments and therefore
will be unable to submit data online through OURS.
6) OURS and the integration that will be built for it to address the BI system's needs will have to be
completely and thoroughly documented to ensure NEA's security and sustainability such that other
implementors/vendors could study the system, troubleshoot and provide support and maintenance, as
needed.
17
.NET requires a minimal investment on development license cost as opposed to Java which does not.
However, as OURS is already being implemented, the following are NEA's options moving forward:
In order to make OURS the data collection system, it is pre-requisite that all issues identified above are
addressed to ensure its seamless integration with the BI system. The implication of this option is that
NEA will need to coordinate with 2 system implementors (i.e. Prudentia and web portal/BI implementor).
As these are two separate providers, both providers will rely on NEA to do the coordination work
including interdependent activities such as integration design and testing. Another risk of this option is
that no matter how well the BI system is developed, it will not be usable unless all issues on OURS are
resolved and are completed prior to the testing phase of the BI system. As a standard practice, the BI
implementor cannot be held contractually liable in case Prudentia fails to deliver. OURS' implementation
timeline has stretched and extended beyond its planned schedule. This would be a risk to the
implementation of the BI system, if it will depend on OURS for data collection.
Also, OURS is basically considered a SaaS solution that is being custom-developed specifically for NEA.
The vendor will not charge anything to NEA but will charge subscription fees to the ECs on a monthly
basis. If OURS will have to be customized to develop the additional requirements for a data collection
system, there is no clarity on who will shoulder this cost.
To avoid having 2 redundant systems catering to a similar function, the other option is to discontinue
OURS upon implementation of the BI System and have a web portal component developed based on the
envisioned functional design. If implementation of the web portal is followed according to the details and
schedule in this design document, the solution composed of the identified functional requirements
needed to have an integrated system fully functional upon system implementation will be available to
NEA. Although not a requirement, if both the web portal and BI system are contracted to a single system
implementor, this would help reduce project implementation risks on NEA’s part, as the system
implementor will be responsible in ensuring that the end-to-end system design (from data collection,
organization to visualization) will work seamlessly to ultimately provide an integrated system that
facilitates effective and efficient data reporting and analysis.
The diagram above shows a logical setup which can be adopted and implemented for the system. In this
setup, it can be seen that the servers for the solution will have a presentation layer – Web Server – located
18
in a DMZ or the demilitarized zone (also called perimeter network), a public-facing zone. This layer will
serve as the gateway and point of contact of the different users of the system (ECs and the public like DOE,
ERC, etc.). The business logic will be separated and hosted on an application server located within the non-
public facing zone of the network separate from the Web presentation layer. In addition, the database server
is also located in a non-public facing zone. It is also important to have the necessary storage for storing and
processing the expected voluminous data to be processed by the system. A common storage solution can
be used for managing the transactional data which can also be used for creating data snapshots or backup
which can then be offloaded to cheaper storage media such as tape or portable storage devices and further,
be stored in a secure off-site location.
To guide in the selection of hardware for the BI system, the following table outlines key components
characteristics or capabilities to allow for a future-ready and flexible application:
18
“In computer networks, a DMZ is a physical or logical sub-network that separates an internal local area network (LAN) from other
untrusted networks, usually the Internet. External-facing servers, resources and services are located in the DMZ so they are
accessible from the Internet but the rest of the internal LAN remains unreachable. This provides an additional layer of security to the
LAN as it restricts the ability of hackers to directly access internal servers and data via the Internet.” (Techtarget.com)
Based on the system and end users transaction requirements, the following hardware specifications are
required to host the envisioned solutions.
Table 17: Hardware Specifications for Web Portal
Production Non-production (QAS & DEV)
Application Web/Application
Web Server Database Server Database Server
Server Server
CPU (Cores) 2 Cores 4 Cores 4 Cores 4 Cores 4 Cores
Memory (GB
8 GB 32 GB 32 GB 32 GB 32 GB
RAM)
System Disk
100 GB 100 GB 100 GB 100 GB 100 GB
Space
Data Disk
300 GB 1 TB 1 TB 1 TB 1.5TB
Space
Windows, Linux Windows, Linux Windows, Linux or Windows, Linux Windows, Linux or
OS
or equivalent or equivalent equivalent or equivalent equivalent
Any RDBMS that Any RDBMS that
Software
can provide the can provide the
(for Database N/A N/A N/A
required required
Servers)
functionalities. functionalities.
The specifications above can be used as a guideline in procuring physical servers for an on-premise setup or
for provisioning cloud based services.
For high-availability of an on-premise setup, an additional set of hardware to mirror the production servers
may be procured to provide local redundancy.
An alternative approach for procuring individual servers for an on-premise setup would be to consolidate the
server requirements for production and non-production, and procure large servers which can be managed
and partitioned accordingly using a virtualization tool. This will allow an organization to have some
capabilities available similar to cloud services, providing more control over their computing landscape (i.e.
how servers are provisioned, utilized and managed). The limitation would be the type of services available
compared to public cloud offers as well as expansion capabilities as the organization will only have a finite
set of compute, storage and network resources. The following can be considered for such consolidated
setup:
For the physical servers, non-consolidated/individual servers and consolidated servers setup, a shared fiber
channel / iSCSI Storage Access Network (SAN) device is recommended for better disk storage
management. This should be paired with dual SAN switches with redundancy for resiliency. The SAN
storage solution will also allow more efficient utilization of storage resources and easier expansion.
In addition, an enterprise backup tape system, using Linear Tape-Open (LTO) technology should be
considered as a means to create copies of the system backup to portable media (tape, in this case) to allow
the organization to easily transport copies of the backup to secure remote locations for safe-keeping.
Based on the parameters provided above, the data traffic and transmission time are shown below:
Peak
Concurrent Upload Size per With Network Transmit time at Transmit time at
Total Upload per
Access / Session Overhead 10Mbps 25Mbps
Session (MB)
Session (MB) (10%; MB) (hh:mm:ss) (hh:mm:ss)
(Users)
50 5 250 275 00:03:40 00:01:25
The estimated transmission time assumes that the full bandwidth is allocated or dedicated for the data
transmission though actual performance will be affected based on the utilization of the link. Based on the
information on the upgraded link of NEA (20Mbps and 15Mbps) that is load balanced, these should be able
to support the system if hosted internally in NEA or on the cloud.
To ensure that the network infrastructure of NEA is able to support the needs of the proposed system as well
as other systems currently running or planned, the following activities are recommended:
Ensure all network documentations are updated and reflects what is implemented in production (e.g.
Network Topology & Design, LAN segmentation, IP Addressing scheme, Network Equipment
inventory with status, Access list, Current Internet Link Utilization, Network Routing, and others)
Assess current network status and develop recommendations and action plans.
Update the Network Design and Configuration in alignment with the recommendations and action
plans as well as with access and security policies.
Implement the recommendations and action plans.
Prior to system implementation projects, it is assumed that NEA has already completed all ongoing Network
related initiatives for 2015:
Completion of government interconnection via DOST-ICTO
Upgrade of the internet links to 20Mbps and 15Mbps
Implementation of a network load balancer
Upgrade of the LAN via a structured cabling project
As there are other factors that contribute to the overall network performance, the following needs to be
included in the network assessment to determine other components that need to be in place:
Actual network traffic/utilization at LAN, WAN and Internet level
Network topology, design and configuration that govern how network traffic moves, this will include
the network segmentation, routing rules, access list, hops, and others
Information Security rules and policies are reflected in the network design and configuration, as the
network performance will have some overhead as a result of information security
scanning/inspection of network traffic
Current status of network equipment – health, capacity, bandwidth
Elimination of possible malware activities in the network (Worms, Trojans, etc.)
The cost estimates for the project does not include the network upgrades/enhancements as the final
recommended actions/initiatives for improving overall network performance can only be determined after a
detailed assessment, a dedicated initiative in itself.
There are two types of workstations needed depending on user type. If a user will only access the system to
upload files and download (static) reports but will not run the advanced BI reports/interface, the following are
the work station minimum specifications:
CPU: i3
Memory: 4GB
Storage: 80GB
Network: Internet and/or LAN connection (1 Mbps)
OS: Windows 7 or latest, Mac OS X, Ubuntu
Software
o Web browser (IE10, Google Chrome, Mozilla Firefox, Safari)
o MS Office 2007
o PDF Reader
A typical desktop acquisition cost on average is Php 35,000 depending on the brand, final specifications,
add-ons, features, expandability and model. An alternative to acquisition is to lease units however leasing
may only be viable for large volumes to achieve economies of scale. NEA’s workstation requirement is not
considered as huge, hence leasing might not be a cost-effective option for now but should definitely
considered should the opportunity to merge with other government organization/s to increase required
volumes arise.
The table below presents the advantages and disadvantages of using on-premise delivery technology as
compared to having full or a portion of the implemented application, database or infrastructure in the cloud,
as well as the risks to consider.
Budgeting and acquisition cycle versus capacity Effective capacity planning in alignment of the IT
requirements and actual utilization. It takes time to budgeting process.
acquire new resources should there be a need to
add capacity or replace/repair components.
Risk of computing facility failure (e.g. power outage Establish DR/Business Continuity Site.
or fire in server room).
Option SAAS
Software as a Service is a service delivery model where one or more applications and the
computational resources to run them are provided for use on-demand as a turnkey service. Its
main purpose is to reduce the total cost of hardware and software development, maintenance,
and operations. Security provisions are carried out mainly by the cloud provider. The cloud
consumer does not manage or control the underlying cloud infrastructure or individual
applications, except for preference selections and limited administrative application settings.
Advantages
Maintenance activities are minimal.
Server management and maintenance activities are taken care of by the SAAS provider, except for some
functions that are organization specific and delegated by the solution the organization consuming the
service (i.e., creation of application end-user accounts, deletion of reports, etc.).
No need to maintain IT skills to maintain applications.
SLA-based support from service provider.
Lower upfront investment cost. Typically only a subscription fee is required to be paid on a set
period/cycle.
All system & application patches and upgrades will be managed by the service provider.
Disadvantages
Internet connection is required to access software.
Generally higher recurring software subscription cost than an on-premise software's maintenance
agreement cost.
Critical and confidential data is entrusted to service provider, and hosted on a shared infrastructure base
though logically segregated/separated from other organizations.
System availability is dependent on internet and service provider’s availability. If either is down or faulty,
the system would be inaccessible.
Integrations with other corporate systems is more complex as data will have to be sent through the
internet.
Potential Risks Risk Mitigation Strategies
Full dependence on provider such that if the Endeavor to establish an amendment or additional
provider is acquired, stops the service or closes clause in the contract for cloud services to govern
shop, there is a potential disruption to the business the use of providers cloud services,
and may take NEA some time to select a new data/information security and engagement between
SaaS solution and perform data migration from NEA and the cloud services provider. This is an
current to new SaaS provider. There is also the risk addendum extending the standard agreement to
Risk of system unavailability if internet connection Establish a business continuity plan to resort to
or service provider’s system is unavailable. alternative automated and/or manual processes
during downtime and a mechanism to transport
data to the system one it becomes available.
Option PAAS
Platform as a Service is a service delivery model where the computing platform is provided as
an on-demand service upon which applications can be developed and deployed. Its main
purpose is to reduce the cost and complexity of buying, housing, and managing the underlying
hardware and software components of the platform, including any needed program and
database development tools. The development environment is typically special purpose,
determined by the cloud provider and tailored to the design and architecture of its platform. The
cloud consumer has control over applications and application environment settings of the
platform. Security provisions are split between the cloud provider and the cloud consumer.
Advantages
No need to invest in technology for platform that will be used only for development
No need to maintain IT skills needed to maintain the platform.
The main advantage of public PaaS is that the consumer of PaaS services does not have to manage and
maintain the infrastructure or the application stack (operating system, application server, database, and
programming language).
Development team can focus on developing codes for the application.
Disadvantages
Might not be beneficial to NEA if they are not planning to keep an in-house IT team that will develop
applications using the platform.
Need to pay recurring maintenance cost for software components that were obtained from PaaS.
Once the subscription expires, an application running on the PaaS platform may stop working, experience
performance degradation, or have annoying pop-ups.
System availability is dependent on internet and service provider’s availability. If either is down or faulty,
the system is inaccessible.
Potential Risks Risk Mitigation Strategies
Risk of system unavailability if internet connection Establish a business continuity plan to resort to
or service provider’s system is unavailable. alternative automated and/or manual processes
during downtime and a mechanism to transport
Option IAAS
Infrastructure as a Service is a service delivery model where the basic computing infrastructure
of servers, software, and network equipment is provided as an on-demand service upon which
a platform to develop and execute applications can be established. Its main purpose is to avoid
purchasing, housing, and managing the basic hardware and software infrastructure
components, and instead obtain those resources as virtualized objects controllable via a service
interface. The cloud consumer generally has broad freedom to choose the operating system
and development environment to be hosted. Security provisions beyond the basic infrastructure
are carried out mainly by the cloud consumer.
Advantages
Server management and maintenance activities not necessary.
Less upfront capital cost for hardware/infrastructure.
Utility-based or pay-as-you-go model which promotes highly scalable resources that can easily be
adjusted as the need arises. This eliminates high upfront capital costs of hardware.
Savings can be realized in terms of equipment maintenance (i.e., manpower, facilities management,
HW/SW procurement, provisioning, patching, etc.)
Some administrative tasks (Hardware Maintenance, upgrades, repairs, expansion, etc.) are taken care of
by the provider.
Service provider takes care of infrastructure, risks to ensure high availability and disaster recovery are
also within provider's responsibility.
Disadvantages
Higher recurring service subscription fee/ cost.
Critical and confidential data is entrusted to service provider.
Infrastructure availability is dependent on internet and service provider’s infrastructure availability. If either
is down, the system is inaccessible.
Heavy reliance on service provider and internet for Comprehensive review of SLAs, data security
availability and data security warranties and exit process prior to contracting to
ensure acceptable service level is achieved.
Critical and confidential data is entrusted to service Endeavor to establish an amendment or additional
provider. clause in the contract for cloud services to govern
the use of providers cloud services,
data/information security and engagement between
NEA and the cloud services provider. This is an
addendum extending the standard agreement to
cover specific needs of the organization.
Should be part of the contract terms (i.e., assurance
that data is deleted upon termination of service,
migration to new service provider in case of change
of provider, etc.)
Risk of failure at provider’s server site Subscription to premium service for higher
resiliency feature.
There are a number of vendors in the Cloud Hosting services area each with their own set of offerings and
tools which can be a variation or combination of the aforementioned three types of cloud services models
(SaaS, PaaS, IaaS). In terms of deployment model, there also different options such as:
Private Cloud – where a cloud computing setup is dedicated for the use of a private organization.
Public Cloud – where a cloud computing services provider offers cloud-based resources consumed
by different organizations they share the underlying resources (hardware, software, etc) though there
is a mechanism for logically separating the different organizations' allocated resources such that
these (sub-partitions / cloud service) are dedicated to the organization.
Community Cloud – this is somewhere between a public and private cloud, wherein the cloud
resources are shared and dedicated to two or more organizations that have a common set of cloud
computing requirements, standards, privacy, security, and regulatory settings, instead of just for a
single organization.
Hybrid – pertains to a setup wherein a combination of private, public or community is implemented to
allow its users to interoperate with one another.
Numerous cloud option combinations are applicable to the implementation of the NEA IT System and it can
be expected that various vendors will propose varying approaches and may result in some refinement to the
initial design.
Given the variety of cloud types/models and deployment models, and in consideration of the type of
workload foreseen for NEA’s future requirements, for the purposes of this study, only two setup models were
analyzed for Total Cost of Ownership (TCO). The first option being the private on-premise and the second
option, a full-cloud setup. For the on-premise setup, NEA will acquire their own hardware and software
resources, then install the solution within NEA’s offices. The full cloud setup on the other hand refers to a
scenario wherein NEA will host the solution on a public cloud provided by one of the leasing cloud services
providers. An important consideration in a cloud setup is the incoming and outgoing data traffic to a cloud
services provider’s network, as the incoming traffic is usually free, however for outgoing traffic, there is
typically a set free amount of data volume, beyond which incremental charges may apply.
The TCO analysis will allow equivalent comparison of hosting the solution on-premise or in the cloud. As
cloud generally has less upfront cost but has more costly operation and maintenance, while on-premise has
a high upfront cost but is less costly to maintain, TCO will remove the bias of one scenario over the other,
thereby providing a better estimation of costs associated with the acquisition and operation of the
technology. The study however does not limit NEA to these two setup options so as not to limit prospective
bidders who may choose to adapt and apply a different approach and may chose a public, private,
community or hybrid cloud deployment model integrated with an on-premise approach. Vendors may also
leverage on their individual strengths and experience to arrive at the best package.
Scenario 1: On-Premise
The on-premise option gives the organization full control as to what will be done to their applications, data
and equipment. However, this would entail significant effort and investment from NEA; investment not only
on the equipment, but also on skilled manpower for operations and maintenance, and space for both the
manpower and equipment.
Scenario 2: Full Cloud
The second scenario is a cloud delivery model where a cloud server will be used to host both the BI and web
portal applications. The BI software will basically be an on-premise license installed on the cloud to provide
19
the flexibility to install the license on-premise or on the cloud, as necessary . As for the web portal, as it will
be a custom-developed application using Java or .NET, it will not have any application license cost, and the
developed software application will be installed in the same cloud server.
Generally, use of the cloud is known as a cost effective option as it eliminates the need for an organization to
invest on skilled manpower for implementation and maintenance, on equipment and physical space.
19
This is also known as the Bring-Your-Own-License (BYOL) setup.
20
The hardware cost represents the consolidated hardware cost of BI and web portal which will be logically partitioned using a
virtualization tool.
* Cost estimate assumptions are shown in Annex 6.6 Cost Estimate Assumptions. Detailed cost estimate
breakdown details are shown in Annexes 6.6.2, 6.6.3, 6.6.4, and 6.6.5.
The solution for NEA to serve ECs and other agencies the system and its services should be available, at a
minimum:
12 hours a day for 7 days a week
Off hours will be used for batch jobs and maintenance work
Should be accessible via the internet using secure connection
21
Source: Service Availability Forum – Whitepaper
4.4.2 Security
In IT, security often pertains to information security. To provide a holistic approach to securing the most
important asset in an organization, its information security needs to encompass technology, process,
application and infrastructure layers and the organization. This is important as entities with ill intent will
explore and use different avenues of attack.
With the growth in automation of key processes in an organization, there is a need for security of these
systems as these contain critical business information which if lost, damaged or breached can negatively
impact the enterprise. The impact can result to financial loss, loss of competitive edge, operational efficiency
degradation, and loss of reputation.
The threat to security can come from different sources – internal or external to the organization, through
various channels/mediums used by the attackers – such as physically infiltrating a facility to steal physical
files or storage devices, use of malwares and rootkits to exploit system weaknesses and to gain access to
the systems allowing data to be stolen or for the system to be destroyed or crippled, via social engineering to
gain access to the systems by finding ways to get valid access, and other various means.
To defend against these threats, an organization must take a proactive approach by defining and
establishing the necessary security policies, processes and procedures, supported by reliable technologies.
The Information Security framework should cut across the organization from policies, process, data,
applications & technology dimensions. In addition, it is critical to employ continuous education on recent
trends in information security and enabling staff to handle the current and emerging threats.
Data security refers to protective privacy measures to prevent unauthorized access to computers, databases
and websites. It is the practice of keeping data protected from corruption and unwanted access.
For prevention, the following approaches may be employed:
Development and implementation of a secure network design and routing (e.g. proper configuration
of routers, VPN, and other network component to manage and control how data traffic is allowed
within the organization).
Setup and configuration of firewalls (single or multiple) – implement firewalls to segment network and
limit traffic to authorized hosts, ports, protocols.
Setup of Intrusion Detection and Prevention Solutions – detection of malicious activities and provide
mechanisms to prevent the malicious action by sending alerts to concerned administrators, reset of
the suspect connection, blocking of certain traffic/ip, and other measures.
Setup of Anti-Spam solutions – screening of emails for SPAM. Some emails are used for phishing
and other forms of attack.
Setup of Anti-Virus solutions – detection and neutralization of computer virus, worms, trojans and
other malwares.
Operating system or software hardening – strengthening the software layer by turning off
unnecessary/unused services, securing user accounts especially those with power or administration
rights, application of necessary patches/fixes to plug security holes or bugs (such as buffer
overflows) that may be exploited by an attacker to breach a system.
Ideally, there should be multiple measures set up for detecting malicious activities in a network or system,
and the internal team should have the capability to neutralize these threats. An effective backup and
recovery strategy, disaster recovery and business continuity plan can complement information security by
allowing a means for the organization to recover the state prior to the breach.
The diagram above shows the current network landscape with some of the existing security solutions in
place at NEA.
It is important to set standards and policies which can protect relevant information from being extracted and
accessed by unauthorized users. All user accounts, computers, printers and other security principals, should
be registered in a centralized database. Authentication should take place on domain controllers. Each
person who uses computers within a domain should receive a unique user account that can then be
assigned access to resources within the domain.
The utilization of user role/profile based access increases the security level of the systems. The user profiles
can help users to maintain their own preferences, network settings and application settings when logging on
to a workstation. Also, the user profile can be assigned with unique functionalities depending on one’s role in
the system.
Benefits of utilizing user profiles are the following:
Multiple users on a computer can retain their personal settings
System policies can be applied individually or per group
Limit/control information access based on user necessities
For a NEA network computer, there are three main types of users who can log into the workstations, and
each type of user (known as user profile) will have certain access restrictions in the system.
EC User. This user profile mainly has the capability to upload, revise and view their data.
NEA User. This profile also has the capability to upload, revise and view their data as well as the
data submitted by the ECs
NEA System Administrator. This user has the capability to create and manage system settings, user
accounts and profiles.
The Information Security Policies and Procedures will be a key driver for a secure computing environment.
All stakeholders, not just the users, must be properly trained on information security best practices.
Database technology is a core component of the system and should also be secured from unauthorized
access. Database security concerns the use of a wide range of information security controls to protect
databases against compromises of their confidentiality, integrity and availability. Databases have been
secured against hackers and other threats through network security measures such as firewalls, and
network-based intrusion detection systems that have also been stated earlier. While network security
controls remain valuable in this regard, securing the database systems themselves, and the
programs/functions and data within them, has arguably become more critical as networks are increasingly
opened to wider access from the Internet.
Many organizations develop their own security standards and designs detailing basic security control
measures for their database. These may reflect in user accessibility through granting and revoking,
obligations imposed by corporate information security policies and perhaps security recommendations from
the database system and software vendors. The security designs for specific database systems typically
specify further security administration and management functions (such as administration and reporting of
user access rights, log management and analysis, database replication/synchronization and backups) along
with other information security controls such as data entry validation and audit trails. Furthermore, other
operational management of the databases will fall under maintenance which should be incorporated by the
organization for a more specific and detailed policy.
As part of ensuring service availability and information security, it is important for the organization to have a
disaster recovery plan. This plan provides policies and procedures supported by technology that will help
ensure recovery after man-made or natural disasters with minimal to no data loss.
With the organization increasing its reliance on computer systems, a failure or a disaster can cause major
damage to the organization. Typically, a disaster recovery plan requires for a risk identification, assessment
and mitigation exercise to be completed. An enterprise class backup is required to ensure that its data at the
application and database level are secured.
The following measures can be set up to implement database security at the minimum. The amount of
acceptable downtime and data loss will determine the type of backup strategy to be employed.
a regular backup schedule should be defined, with the frequency defined.
a regular backup restore test should be done to ensure that the backup process / system works and
can be counted on during an emergency.
one or more offsite backup location/s should be put in place so that copies of the backup can be
stored for possible use.
required agreements with 3rd party providers need to be established so that in the occurrence of a
scenario where the backup will be needed, the organization can have the necessary resources on
standby or be made available on short notice.
Application Support
Application Support must be available to provide support to incidents and issues reported by the users. This
may be provided either by NEA, the system implementor and/or the software vendor. Application Support
can be classified into three levels.
Level 1 (also referred to as L1, Tier 1 or T1). This is the initial support level that involves gathering basic
information regarding user issues. L1 support will aim to understand the issue by gathering as much
relevant information as possible and record them in an incident log. Basic troubleshooting will also be
done such as: resolving user access problems, verification of software version, system navigation
assistance, procedural clarification, etc.
Level 2 (L2, Tier 2, T2). When the tickets are complex in nature and cannot be resolved by the L1
support, tickets are then escalated for L2 support for in-depth technical support. The L2 support team is
more experienced, skilled and technically proficient than L1, which are typically comprised of application,
server and database specialists.
Level 3 (L3, Tier 3, or T3)
The final escalation is L3, which is the most difficult/advanced problem to resolve. Tickets escalated to
L3 are mostly related to bugs that require deeper analysis. Configuration and codes may be analyzed to
identify the root cause. As such, in-depth domain expertise, application configuration and programming
skills may be needed for L3 tickets.
Level 4 (L4, Tier 4, or T4)
Unresolved L3 tickets are finally escalated to L4, which involves defects related to the software product
or hardware. They are escalated to the vendor for analysis and resolution. Tracking such issues is still
necessary to monitor vendor service level.
Service Levels have to be established for operations and maintenance support. The service level typically
depends on the severity of the ticket which is classified based on their impact and urgency to operations.
The following table shows a severity classification based on impact and urgency.
IMPACT
For each severity level, the service level in terms of a guaranteed resolution time has to be established. A
sample set of service level per ticket severity is shown below:
22
The SLAs are normally confirmed during the implementation transition phase and can be periodically
updated during the actual delivery of the service.
Once the NEA IT System is implemented, all the above IT operation and maintenance activities will have to
be performed regardless of the service delivery model utilized (cloud or on-premise). These services can
either be provided internally by NEA or outsourced to a third-party service provider.
Having these functions performed by NEA will require NEA to maintain resources with the skill sets needed
to maintain the application and hardware. Apart from continuous training, NEA’s IT must have an effective
succession plan to ensure that the necessary IT skills are retained in the organization in case of resignation
or retirement of IT personnel.
Outsourcing Services
An alternative is to outsource the IT operation and maintenance activities to a third-party service provider.
The advantage of outsourcing is that NEA no longer has to manage retention and continuous training of the
resources. Further, third-party service providers typically implement industry standard quality frameworks
applicable to such services such as Information Technology Infrastructure Library (ITIL), Capability Maturity
Model Integration (CMMI), Test Maturity Model Integration (TMMI), and Information Security Management
Systems (ISMS) that ensure delivery of quality services through adoption of international IT best practices.
Outsourcing these services would be a more strategic and cost-effective option for IT System Operation and
Maintenance. Outsourcing such services will allow NEA to focus on its core mandate of being an oversight
body to the ECs supporting total electrification, and their IT department can then focus on the more strategic
and high-value aspects of IT services, rather than on the day-to-day operation and maintenance of the NEA
IT System.
5 Implementation Phase
2. Align the requirements across all departments in NEA and with ECs.
The project team will conduct alignment meetings within NEA departments to standardize and unify
requirements in terms of level of detail and format. (i.e. standard format for statement of Income and
Expenses, Balance Sheet, etc.)
3. Establish review of operational policies and procedures as a regular (i.e., monthly) activity facilitated
by a particular department within NEA or by the project team. In preparation for system
implementation, this is expected to include policies on information security such as on passwords
and maintaining central repositories.
4. Establish processes to properly cascade policies and procedures. In addition, establish a centralized
entity to consolidate issues involving guidelines, policies and procedures. The stability of this
process will be valuable and useful to the need to cascade information and guidelines once the
application systems are available.
5. Conduct manpower capacity review and address identified gaps through training and/or outsourcing
which may include:
IT skills assessment to ensure availability of resources to manage and administer
information systems (includes virtualization administration training, OS administration, DB
administration, web/portal administration, network administration, cloud administration. For a
full list, see Annex 6.7.3)
Information Security
Basic ITIL training to manage outsourced services
Creative analysis which must be present in all key depts. (FIT)
6. Define Data Governance Process and form Data Governance Team (see Section 3.5)
9. Prepare historical data to be uploaded into the system (see Section 3.6)
10. Review IT Asset Inventory and update as necessary. Though this should also be a regularly
conducted activity, it is critical to be done prior to the system implementation projects to identify
necessary purchases that if delayed may hold the implementation project timelines as well.
11. IT Facilities Upgrade. Aside from the inventory update, existing IT facilities' condition must also be
checked and set up for upgrade (may involve purchases) as necessary for all equipment to be ready
for the implementation of systems. NEA's network facilities are critical to the operations of systems
and should be prioritized in the conduct of this activity.
12. Prepare plans for Back Up and Disaster Recovery. For additional data security, back up and disaster
recovery plans will need to be established and ready by the time systems go live.
For NEA's guidance for the Implementation Phase, a high-level implementation schedule is presented below.
The schedule presented above aims to list and plot the estimated duration of the implementation activities for the IT systems of NEA as well as the
responsible stakeholder groups involved per activity. There will be one implementation project each for the BI system and the web portal. Additional activities
are included in the schedule to complement the implementation projects. All activities are discussed in further detail in the succeeding table. The estimated
project duration for web portal and BI System implementation is 13 months. This can still be shortened, depending on the commitment not just of the system
implementor, but also of NEA as several deliverables and responsibilities will be shared by both stakeholders.
An alternate condensed (more aggressive) implementation schedule is provided in Annex 6.9 NEA IT Implementation Schedule – Condensed.
During the Discovery Phase, the prioritization for the identified BI analysis opportunities was explored based
on feedback from the ECs on which data is easy/difficult to provide and feedback from NEA on which
analysis is critical to their regular assessment of EC situations. However since it was reported that most
23 24
data can be provided by the ECs, phasing the implementation of the BI system is no longer necessary
and all of NEA's subject areas can be implemented within a period of eight (8) months. This grants NEA the
full benefit of having BI technology as soon as possible, which is through the analysis that can be done
across subject areas (i.e., combination of technical and financial analysis).
The diagram above presents the following activities within a BI implementation project. Note that though the
schedule of Post-Implementation Support could be beyond 3 months, the schedule is displayed as such to
focus on actual implementation activities.
Project Initiation - setting up and introduction between the implementors and NEA, this includes the
project kick-off.
Requirements Analysis - data requirements and report output details are validated and finalized in
preparation for the succeeding development efforts.
Installation and Configuration of Software - initial setup of the system from unboxing to installation
and preliminary configuration. This may include the setup of environments (development, quality
assurance, production) and the user profiles of developers and testers.
System Design - preparation of the final documentation for guidance of the development team
based on requirements finalized.
Development
o ETL Development and Unit Test - preparation and deployment of scripts that will execute
the ETL processes. This includes unit testing to ensure that the outputs returned based on
the system design are as expected.
23
The only exceptions were feeder-level data and savings on WESM transactions.
24
In other organizations, implementation is broken into sequential phases wherein each phase is focused on a single data model (i.e.,
financial only).
The activities within the web portal project implementation schedule are similar to the activities in the BI
system implementation. However, its execution will be quite different as the web portal will be developed
ground up as opposed to the BI system being a COTS solution. Each activity will be described below noting
the distinctions it would have from the BI system implementation, when applicable.
Project Initiation - setting up and introduction between the implementors and NEA, this includes the
project kick-off.
Requirements Validation - the project scope in terms of the data templates and system functionalities
are validated and finalized.
Design - based on the finalized requirements, details for each such as fields and validation rules for
each template are validated and finalized in preparation for development. This activity overlaps with
the development effort because this project is estimated to be effective following an agile software
development method wherein users and analysts work closely with the developers following an
26
iterative approach in addressing the requirements .
The standardization of templates and data granularity (including line items in financial statements in
such as the balance sheet and income statement) required are essential to this phase. If not yet
accomplished by NEA, it may delay the implementation timeline.
Development - preparation and deployment of scripts that will execute functions the system will be
composed of. Following an agile method, this is inclusive of testing.
25
Beyond the project implementation timeline and scope, the organization owning the BI system has full right to continue preparing their
own additional dashboards and reports as well as revising those that were prepared for them within the implementation project's
duration.
26
As opposed to the traditional Waterfall Development Methodology wherein project activities are sequential (not parallel) and will not
start until the previous activity is completed.
Another element to a successful implementation of the change is the unwavering support from the
leaders of the organization. As observed, ECs and NEA have a culture that is anchored in respect
for their leaders. Management and leaders should also be advocates of the system and its purpose.
Their commitment, belief and reinforcement of the change could affect the disposition of the whole
organization. Their support and involvement will be the main drivers of the implementation and its
sustainability.
Concern for the achievement of the overall mandate should be fostered within the
organization. If this has been assimilated in their culture, there will be an understanding of
the importance of the data entered into the system and how this ultimately serves as a tool
to provide support to the ECs.
A culture of contribution ensures that each member feels accomplished when they are able
to give value-adding inputs to their job and the overall goal. Now that information is at hand,
the motivation to contribute will push them to be more creative and innovative to further
investigate and analyze data.
This change in culture requires a series of interventions and planned activities to encourage
compliance to new processes and procedures. Staff and management should understand and
acknowledge the importance of each other’s contribution towards the improvement of the current
state and attainment of the mandate.
Project Kick-off: This survey aims to measure Change Readiness This will serve as
Change Readiness organizational readiness. Assessment Report. baseline measure.
Assessment The results can be used to
define change management
interventions needed by the
organization.
Project Planning
System Development
Role Mapping This document will outline User Role Mapping List -Not Applicable-
the roles and responsibilities
of each end-user. This will
clarify changes in job
responsibilities and promote
accountability
Before Go-Live
After Go-Live
Establishment of Concerns and questions are Handholding Support Issues and concerns
Handholding Support expected when end-users Plan are resolved within
start to use the system. The agreed SLAs.
handholding support
structure aims to help users
during the first month of
implementation.
This section presents the key data entry templates designed for EC and NEA.
For more descriptions on the data entry templates, see Section 3.1 Data Entry Templates.
Legend:
Remarks
ELECTRIC COOPERATIVE
MONTH YEAR
Initial Count of
Sitio/Purok Geography Date Energized Fund Source Power Source
Connections
MSEAC or Equivalent
Are there changes in any data
this reporting month?
District / Municipalities / Cities Name/s of Date of Term of Activities
Sector
Covered Members Appointment Office Taken
ACCIDENTS
Are there changes in any data
this reporting month?
Name of Name of Type of ID of
Name of
Outsourced Member- Property/E Property/Eq Description of Cost of Action
Date of Accident Type of Accident Employee Extent of Damage
Employee Consumer/s quipment uipment Accident Damage Taken
Involved
Involved Involved Involved Involved
RETIREMENT PROGRAM
Are there changes in any data
this reporting month?
Actuarial Retirement
Estimated No. of Retiree/s for
Estimated No. of Retiree/s for the Year Fund Fund Manager
the Month
(Php)
Scoping
CAPACITY and Design of IT Systems Upgrade for NEA (Confidential)
BUILDING 92
Are there changes in any data
this reporting month?
Name of Training/Seminar Date of Trianing / Sponsoring
Name of Participant
Information Education Campaign:
Are there changes in any data
this reporting month?
RETIREMENT PROGRAM
Are there changes in any data
this reporting month?
Actuarial Retirement
Estimated No. of Retiree/s for
Estimated No. of Retiree/s for the Year Fund Fund Manager
the Month
(Php)
CAPACITY BUILDING
Are there changes in any data
this reporting month?
Name of Training/Seminar Date of Trianing / Sponsoring
Name of Participant
Attended Seminar Agency
PATRONAGE CREDIT/REFUND
Are there changes in any data
this reporting month?
BY-LAWS AMENDMENT
Are there changes in any data
this reporting month?
NEA Action
AGMA Resolution Board Resolution Date of Submission
Date Approved Date Disapproved
EXTERNAL AUDIT
External Audit this reporting
month?
COVERING PERIOD TO
PUBLISH DATE OF AUDIT REPORT
EXTERNAL AUDIT RATING
The line items of the Income Statement and Balance Sheet have to be standardized during system
implementation.
District /
Number of Elected / Total No. of Voter's End Date of Reason for End of
Start Date of Term No. of Voters Municipalities / BOD Position
Term of Office Appointed? Years as BOD Turnout Term Term
Cities Covered
27
It should be noted that DOE maintains a list of existing power plants. NEA should consider using this list and align with DOE in terms
of data maintenance relevant to power plants in the NEA IT System.
5a. Brief description of methodology used in load forecasting and supply expansion plan:
Load Forecasting is based on the models provided by NEA during the Biennial e-ICPM Workplan.
9a. Number of Barangays in the Franchise Area 309 309 309 309 309
9b. Number of Households in the Franchise Area 93,840 95,283 96,649 98,017 99,386
9c. Number of Sitios in the Franchise Area 653 653
On-Grid: Direct Sales to Customers MWh 40,446 42,035 47,306 50,822 47,262 - - - - - - - - - -
Total: Direct Sales to Customers MWh 40,446 42,035 47,306 50,822 47,262 - - - - - - - - - -
Supply Forecast
Supply Expansion Plan
2015 2016 2017 2018 2019 2020 2021 2022 2023 2024
13a. Utility Owned Power generating Facilities
Name:
Status:
Fuel Requirement (liters, tons, etc.)
Installed Capacity KW
Net Dependable Capacity KW
Net Production MWH
Name:
Status:
Fuel Requirement (liters, tons, etc.)
Installed Capacity KW
Net Dependable Capacity KW
Net Production MWH
Name:
Status:
Fuel Requirement (liters, tons, etc.)
Installed Capacity KW
Net Dependable Capacity KW
Net Production MWH
Name:
Status:
Fuel Requirement (liters, tons, etc.)
Installed Capacity KW
Net Dependable Capacity KW
Net Production MWH
GM Performance Rating
Name of GM Name
Formula:
System Loss Change Deviation = (% Change in System Loss) - (Average %
Change in System Loss)
% Change in Input % change of Input Energy in one period compared to the previous period Numeric Measure Calculated
Energy
% Change in Output % change of Output Energy in one period compared to the previous period Numeric Measure Calculated
Energy
% Change in System % change of System Loss in one period compared to the previous period Numeric Measure Calculated
Loss
Formula:
% Change in System Loss = ([(Current Period System Loss) - (Last Period
System Loss)] / [(Current Period System Loss)])*100%
% of Lifeline Percentage Measure Calculated
Connections
% Status of Compliance % compliance to a code Percentage Measure Calculated x%, No Input
Formula:
% Status of Compliance = ((Count of Applicable Parameters Complied With)
/ (Count of Applicable Parameters)*100%
If Count of Applicable Parameters = 0, then "No Input"
Accounts Payable Accounts payable of an EC to creditors, suppliers, vendors and other parties Numeric Dimension Entered
Accounts Payable - An indicator that states the ability of the EC to pay its maturing power Alphanumeric Dimension Configured Current, Restructured-Current, In
Power - Indicator accounts to GENCOs, NGCP and PEMC including VAT Arrears
Formula:
If Cash General Fund >= (Ave. Power Cost for the last 12 months) + (Ave.
Non-Power Cost for the last 12 months), then Compliant.
If Cash General Fund < (Ave. Power Cost for the last 12 months) + (Ave.
Non-Power Cost for the last 12 months), then Non-compliant.
Source:
Parameters and Standards in the Assessment of the EC Financial Condition
and Operational Performance
Action Taken Action taken by the EC on an accident Alphanumeric Attribute Entered
Activities Undertaken Activities undertaken related to MSEAC or equivalent Alphanumeric Attribute Entered
Actual Dispatched - Actual energy dispatched by a power supplier Numeric Attribute Entered
Energy
Asset Turnover An indicator of how much the EC earns from its assets. Simulations of asset Numeric Measure Calculated
turnover may also be used in assessing potential asset-expansion projects.
Formula = Net Sales/Average Net Utility Plant
Assets Assets of an EC ranging from cash and temporary investments to accrued Numeric Dimension Calculated Cash and Temporary Cash
assets and deferred debits etc. Investment, Notes and Accounts
Receivable, Materials and supplies,
Accrued Assets, Deferred Debits,
Other Property and Investment
Attendance Status Present or Absent status of a BOD in a meeting Alphanumeric Dimension Defined Present, Absent
Consumer Accounts
Rates
Collections
Pilferage Recoveries
Other Income
Salaries
Benefits and Allowances
Cash Advances to Officers and
Employees
Retirement
Complaint
Others
Audit Finding Applicable only if Audit Type = NEA Alphanumeric Attribute Entered
Description
Audit Rating Alphanumeric Dimension Defined If Audit Type = NEA Audit
- Blue
- Purple
- Red
Average Price NEA Average price of an item or group of items based on NEA-selected price Numeric Measure Calculated
Average Reading Cycle Average reading cycle of a group of ECs or per Class of Service Numeric Measure Calculated
Average Reading Period Average reading period of a group of ECs or per Class of Service Numeric Measure Calculated
Average Salaries and Numeric Measure Calculated
Wages per Connection
Average Sales per Average sales in PHP per connection among a group of ECs Numeric Measure Calculated
Connection
Average Sales per KM Average sales in PHP per KM of Line among a group of ECs Numeric Measure Calculated
Length of Line
Formula: Average Sales per KM Length of Line = Sum([Sales])/Sum([KM
Length of Line])
Financial
- Loan
- Rate application to ERC
- Procurement
- Others
Institutional
- Regular Activities (this includes
- Organization
- Salaries
- District Elections
- Board Qualifications
- GM/DM Selection
- MSEAC, AGMA or BAPA)
Technical
- Request for Technical Assistance
- Others
Board Resolution Date mm/dd/yyyy Attribute Entered
Board Resolution No. Alphanumeric Attribute Entered
Board Resolution Title Alphanumeric Attribute Entered
BOD District Geography represented by a BOD Alphanumeric Attribute Entered
BOD Meeting Type Alphanumeric Dimension Defined Regular, Special, Committee
Business Tax Municipality-imposed Numeric Measure Entered
Formula: Cash General Fund = (Working Fund, Revolving Fund, Petty Cash
Fund-General Fund) + (Cash in Banks-General Fund) + (Cash on Hand-
Collection Efficiency = Total collection for the year / (Gross A/R Beg.) +
(Operating Revenue - Current Month Operating Revenue)
Maintenance
1 Maintenance - Supervision &
Engineering
2 Maintenance - Overhead Lines
3 Maintenance - Station Equipment
4 Maintenance - Line Transformers
5 Maintenance - Street Lighting &
Signal System
6 Maintenance - Meters
7 Maintenance - General Plant
District / Municipalities / District / Municipalities / Cities covered by an MSEAC or equivalent Alphanumeric Attribute Entered
Cities Covered
Documentary of Good Not required to be reported for Position = Manager or Employee Alphanumeric Attribute Entered
Moral Character
DSM Revenue Revenue of an EC on Distribution, Supply, and Metering Numeric Measure Calculated
Duration * Count of Duration * Count of Customers affected by an interruption Numeric Measure Entered
Customers Affected
EC Classification A classification system which groups ECs based on 6 financial and Alphanumeric Dimension Defined Green, Yellow 1, Yellow 2, Red
(Compliance) operational standards and parameters under the Guidelines for the
Classification of ECs
Source: RA 9513
Feed-In Tariff Allowance Numeric Attribute Entered
(FIT-All) - NGCP
Source: EPIRA
Lifeline Rate In pesos. This is the rate applied to consumption within lifeline consumption Numeric Measure Calculated
ranges.
Lifeline Subsidy An amount added to regular consumers' electricity bill to subsidize the Numeric Measure Entered
discount provided to lifeline bills.
Load Factor - EC Measure of electrical usage efficiency of an EC. Represented in % Percentage Measure Calculated
Power Source An indication of the power source of a newly energized sitio/purok (i.e. solar, Alphanumeric Attribute Entered
grid)
Power Supplier Address Alphanumeric Attribute Entered
Power Supplier Contact Alphanumeric Attribute Entered
Number
Power Supplier Contact Alphanumeric Attribute Entered
Person
Power Supplier Name Alphanumeric Attribute Entered
Power Supplier Name Name of the power supplier owner (for example, Aboitiz Power) Alphanumeric Attribute Entered
Power Supplier Owner A classification system of power supplier owners Alphanumeric Dimension Defined Distribution Utility, NPC, Local Private
Type Supply, Others
Power Supplier VAT Reg VAT Registration TIN No. of the power supplier owner Alphanumeric Attribute Entered
TIN No.
Power Supply Agreement mm/dd/yyyy Attribute Entered
End Date
Memo 2013-024
System Average RMS Numeric Attribute Entered
Voltage Index (SARVI)
110
System Average RMS Numeric Attribute Entered
Voltage Index (SARVI) 90
Memo 2013-024
System Loss Cap A percentage cap that the ERC shall, after due notice and hearing, prescribe Numeric Measure Configured
on the system loss that the Distributor can pass on to its End-Users.
Source: RA 10531
System Loss Charge Represents the amount recovered by the ECs from their consumers for the Numeric Dimension Entered
cost of power lost due to technical and non-technical losses.
Only 13% system loss can be recovered from the consumers. If EC's system
loss is beyond, such cost is shouldered by the EC.
System Loss Indicator An indicator that states that an EC is non-compliant if its system loss is Alphanumeric Measure Configured Compliant, Non-Compliant
above the System Loss Cap, and compliant if below or equal to the System
Loss Cap.
Process
Reference Process Level 1 Process Level 2 Description
28
Number
T4.0 Data Governance N.A. Key Data Governance processes
T4.1 Data Governance Data Maintenance To identify and validate changes or additions triggered by events such
as new or updated policies or regulations and new BI analysis
opportunities to the master data, templates, data architecture and data
configurations in the system
T4.2 Data Governance Data Upload – Standard To upload data (e.g. equivalent data from MFSR, MER, MIR, audit
findings) from ECs or NEA into the system on a periodic basis under
normal circumstances.
T4.3 Data Governance Data Upload – Special Handling To upload data from EC or NEA into the system that may have issues
and cannot be performed through the "Data Upload (Standard)”
process due to special circumstances (e.g. unreliable internet
connection in the EC’s area, template has not been
completed/uploaded in time for the defined report submission cut-off
date, system in unavailable, data errors that require investigation by the
Data Governance Team, etc.)
T4.4 Data Governance NEA Data Approval To approve the data content uploaded either through the “Data Upload
(Standard)” or “Data Upload (Special Handling)” process to ensure high
quality of data to be stored into the database.
T4.5 Data Governance Data Warehouse Processing To perform ETL of NEA-approved data, storage of data into the
database as well as to generate key output report and dashboards
28
Process Reference Numbers are a continuation of the Process Reference Numbers of the To-Be Process Maps in the Discovery Report Section 7.12.
T-10 to T0
Data Upload -
Up to T-11 T-9 to T+1* T+2 onwards*
Standard
Data Upload –
Special Handling
T0 = Deadline of Submission for a Reporting Month. For example, for Reporting Month January, Deadline of Submission (T0) is February 28.
*Note that output of Data Warehouse Processing could still be incomplete as there could still be some ECs that have not uploaded data up to
this time
Changes
Team
Data
No
Identify impact to
Data Dictionary, Data
Entry Templates,
Reports, Dashboards
Architecture
Yes
Data
Identify impact to
Data Model
of Values
Changes to Template
Templates Maintenance
required
Changes to
Data Data Architecture
Architecture Maintenance
required
Changes to Implement
system changes in the
configuration system
required configuration
Output
Input /
T-13 to T11
Upload Download
Log-in to web
accomplished template with Correct errors
portal
template data errors
Generate file
with identified
System
No
cells with errors
Show
Perform data
Yes confirmation
validation
message
All data valid?
Input / Output
For example,
New BOD; Changes in BOD
information Date and Time of
New Employee; Changes in Employee Data data upload
Data Information
New PSA
New Substation; Changes in Create New, Edit List Template [with
substation information of Values Template Data Errors]
New/edited list of values for other
fields
[Accomplished]
Interface
Template
required to be
updated
Implement Upload updated Announce that update
NEA
Download latest
Log in to web portal version of
EC
templates
Output
Input /
Template version n
Interface
Yes Yes
A
No Email
Correct
accomplished
errors
template to NEA
Email accomplished
EC
template and
attachments to NEA
No Reject data
uploaded
Notification to EC of
Data Rejection
Interface
Generate ad hoc
reports
NEA
View standard
dashboards
EC
Download
standard reports
Administrator
System
Initiate ETL
No
Data
approved by Generate
Data Owner? standard
System
Data to be uploaded
is on or before the Publish standard
Generate
Reporting Month reports in Web
standard reports
deadline? Portal
Output
Input /
The ECs are the main users of the Web Portal for their submission of populated templates for reporting and corresponding attachments.
To view reports from previous I can analyze and compare data that is Link redirects user to the portal
9 EC user Link to BI portal
months relevant and needed for reports submitted
I can analyze and compare data that is Link redirects user to the portal for
2 NEA user To view reports from previous months
relevant and needed reports submitted
8 NEA user To search data with filters I can easily view certain data that I need Search result successful
To create customized output reports I can easily know the specific information
9 NEA user Report is generated
and analytics that I need
To generate certain reports within a I can create customized reports by date
10 NEA user Report is generated
specific date according to a specific time duration
To give feedback to certain data from It can be used and included as a KPI in EC
11 NEA user Report feedback
the ECs evaluation
The ECs can change their mistakes and the
12 NEA user To request ECs for revisions Revisions Requested
correct data will be recorded to the system
Other users of the system like ERC,
13 NEA user To publish reports DOE,DMC/GMC, GOCC and the public can Reports published online
view them
11 System Admin To search data with filters I can easily view certain data that I need Search result successful
To validate and approve the reports The data can be used for analysis, reports
12 System Admin Approve EC Reports
submitted by NEA and reference
To be able to upload the reports of
13 System Admin I can aid them when they are unable to do it Upload EC Report
the EC
The ECs can change their mistakes and the
14 System Admin To request ECs for revisions Revisions Requested
correct data will be recorded to the system
For NEA's further guidance in transitioning to a BI-supported organization, IT practice recommendations are
presented in this annex.
6.7.1 Strategy
It is ideal for the current and future IT requirements of the organization be realized based on the mandate,
vision and directions of the organization as upheld by management which will then be translated into specific
and actionable goals and supported by a strategy plan and for continuity, recommendations are as follows:
(i) Establish IT strategic planning as a regular activity supported by management and the departments
collectively with a formal planning process from which annual strategic plans are identified for execution
throughout the year and aligned with the defined long-term strategies and goals of NEA.
(ii) Establish the IT function as an enabler and an asset. The function is not just for technical support but
also in managing and enabling integrated technology needs throughout the organization.
(iii) Enhance, acquire and/or develop technical skills. This is necessary for the organization to not be
dependent on external vendors at all time. Skills may be acquired through training and development of
existing staff, hiring of seasoned professionals, acquisition of professional services that will provide and
transfer the necessary skills to NEA's internal technical staff.
(iv) Establish necessary IT standards that will help guide IT investments. These will help support faster
decision-making and avoid unnecessary investments in non-standard areas. Standards also serve as
guidance in what technical skills to focus capacity building on and protection for investments from challenges
posed by the use of non-standard solutions.
(v) Set up and maintain an industry standard Data Center. This is applicable to organizations with technology
hosted on-premise.
6.7.2 Standards
An IT standard is a technical specification that used in guiding various IT activities – planning, design,
implementation and operations. It defines what an organization would officially use and how. It is important to
have standards as it will serve as the accepted common basis within the organization when making
decisions (e.g. design, plans, purchase, upgrades, etc.). Standards also provide the following benefit:
Cost savings as it will support economies of scale, skills development and training will be on a fewer
set of tools and technologies, personnel skill set growth will not be disparate, variety of systems to
support will be less
Faster Time to Market/Deploy. Having standards in place will allow decisions to be made faster.
Reduces risk as adoption of standards typically require that industry standards which have been
tested are adopted are used/adopted internally. Risks are not totally eliminated but are minimized.
Better understanding across divisions and with external parties when used as reference during
discussions such as project/contract negotiations, POC, short listing of options, etc.
Supports Innovation. Standards can serve as the important building blocks when the organization
and its partners/suppliers are doing solution architecting exercises
An initial set of standards to define would be, but are not limited to, the following:
To ensure that the establishment of standards will be successful as well as the use of it will not be too
restrictive to the organization the following recommendations can be adopted:
(i) Establish the role / function of a lead Architect. This role will ensure that the defined architecture
standards for NEA will be compliant to standards.
(ii) Establish a primary, secondary and alternative or limited standards. Although there is a need to have a
standard that needs to be complied with, there are cases where the primary standard will not be able to
support the needs of an enterprise. The secondary, alternative or limited standard is meant to allow for this
minor deviation (during an agreed period) with the goal of eventually complying to the primary standard; and
in cases where it is determined to be necessary, update the standards defined.
(iii) Establish a common repository for the standards to make it easy to be used for compliance, governance
and monitoring as well as when there is a need to update.
The section below presents IT organizational functions to serve as guidance in developing IT capabilities in
an organization. Since these are functions, each item need not represent a single person or group and may
be a responsibility shared by a group of persons. Similarly, a number of functions may be handled by a
single person. Should the functions needed not be available in the current organization and/or non-strategic
IT function in nature, such could be acquired by hiring or outsourcing.
Presented below are the main tasks, responsibilities and skills that are covered by each function. Key skills
and competencies of the person/s to be assigned such function are also included as additional guidance.
Information Security
Information Security is a critical function to ensure that information is managed according to how it is
intended. The objective of this function is to identify, develop, manage, enforce and resolve processes,
procedures, standards and associated documentation relative to security of information systems, networks
and telecommunication to address privacy and confidentiality accordingly. This includes the protection of
information from unauthorized access, modification and destruction as well as the proper education of
employees in maintaining information security in day-to-day activities.
Oversee the establishment and maintenance of technical computer and network security systems
and protocols
Oversee the establishment and maintenance of administrative computer and network security
systems and protocols
Establish and maintain written policies and procedures for the handling and release of information
IT Operations and Maintenance is responsible for providing for the daily computing needs across an
organization and ensuring smooth day-to-day operations involving all IT-related facilities. For manageability
of scope, responsibilities are further distributed and grouped to Network, Support and Infrastructure
Operations and Maintenance.
This function is responsible for the consistent, reliable and secure network availability for collaboration
needs.
Support Operations and Maintenance is the central receiver and manager of all communicated IT needs and
ensures that all IT-related needs and requests are properly delegated to the respective persons-in-charge for
immediate resolution.
As the backbone of all IT facilities, it is crucial to have strong Infrastructure Operations and Maintenance to
guarantee the stability of servers, databases, assets and other hardware.
The objective of Delivery is to ensure that evolving IT needs of an organization are addressed, that each IT
initiative is designed to suit the organization's needs and that all IT investments are maximized. As opposed
to Operations and Maintenance involvement with daily operations, the work of Delivery would be project or
initiative-based.
This group is responsible for representing the organization to the world of IT and on the other hand,
representing the organization when dealing with external entities such as IT Consultants and Vendors.
Main Tasks and Responsibilities:
Plan and identify needs computing and automation needs of the organization
Design automated solutions for implementation
Configure information systems according to the organization's needs
Test systems, programs and tools to identify errors and inconsistencies
Manage and monitor implementation projects
Facilitate IT implementation related training
Key Skills and Competencies:
Vendor Management
Client Management
Negotiation
Business Analysis
Problem Solving
Presentation
Facilitation
Project Management
Attentive to Details
Teamwork
Communication/Listening
Development
The Development Group serves as the technical arm of Delivery. Side by side with Service Planning and
Requirements Management, this group executes the changes to an organization's IT landscape through the
creation of forms, reports and programs.
Main Tasks and Responsibilities:
Prepare development plans and strategy for solutions identified
Develop and deploy solutions in the form of automated programs
Troubleshoot errors and inconsistencies found in information systems and programs
Test developed programs to ensure quality in development activities
Key Skills and Competencies:
Proficiency in applicable Development Language/s
Analytical and Logical Thinking
Teamwork
Attentive to Details
33
As opposed to Data Ownership or being part of a Data Governance Team, which is a permanently required role even beyond
implementation though can be transferred to different persons as necessary. Transfer of responsibilities as part of the Project Team
is discouraged as the assignment is temporary and relies heavily on continuous full-time involvement.
Data Validator Financial / Technical / Institutional Gather data from various sources
Analysis Define the criteria of acceptability of
a set of data in accordance to the
data dictionary
Decide on which data to use for each
EC and time period that will be
entered into the standard templates
May need to validate data with the
ECs
This is a condensed implementation schedule to present which activities can be shortened, accomplished in parallel and sooner, resulting to an earlier go-
live of the Web Portal and the BI System. The condensed timeline shows that the Web Portal will be implemented two months earlier than the
Implementation Scheduled (Figure 23) in Section 5.2, and the BI system four months earlier.
www.bc.indracompany.com