Please be advised that under Governor Carney’s Declaration of a State of Emergency, the Delaware Public Service Commission is authorized to hold all public meetings by means of telephone conference call. Therefore, until such time that the State of Emergency is lifted, all public meetings will be conducted solely by teleconference. Members of the public are permitted to participate in meetings via telephone, and all public agendas will include the participation telephone number. More Info
On May 23, 2016, the Staff of the Public Service Commission (“Staff”) filed a petition (Docket No. 16-0659) requesting that the Delaware Public Service Commission open a docket to review whether cybersecurity guidelines or regulations are needed to ensure and maintain safe and reliable public utility services for customers in the State of Delaware. The Commission has the exclusive jurisdiction and authority over such matters pursuant to 26 Del. C. §§201(a) and 209(a)(2).
There remains a potential for a cybersecurity breach of utility customer information and/or their system control systems. No matter how well the utilities monitor secure these systems. As noted in the petition, Staff recommended a discussion of the cybersecurity risks that Delaware’s regulated utilities may have to ensure that they are prepared for any such system breach or cyber-attack.
Through the public workshops, Staff confirmed that all regulated utilities in Delaware are aware of the cybersecurity risks and are diligently monitoring facilities and training workforce to ensure that they are prepared for any potential security breach. The utilities are taking the actions that they need to take in order to continue ensuring safe, adequate and reliable utility service to its customers.
To maintain an understanding of regulated utilities’ cybersecurity efforts, all Class A utilities are required to file an annual report in DelaFile that includes both the cybersecurity questions from Staff and the utilities’ responses. Staff will conduct an annual review of the cybersecurity questions and revise as necessary.
The current list of questions is as follows: