UK Government Updates ESOS Guidelines

Britain?s Environment Agency has produced an update to the ESOS guidelines previously published by the Department of Energy and Climate Change. Fortunately for businesses much of it has remained the same. Hence it is only necessary to highlight the changes here.

  1. Participants in joint ventures without a clear majority must assess themselves individually against criteria for participation, and run their own ESOS programs if they comply.
  2. If a party supplying energy to assets held in trust qualifies for ESOS then these assets must be included in its program.
  3. Total energy consumption applies only to assets held on both the 31 December 2014 and 5 December 2015 peg points. This is relevant to the construction industry where sites may exchange hands between the two dates. The definition of ?held? includes borrowed, leased, rented and used.
  4. Energy consumption while travelling by plane or ship is only relevant if either (or both) start and end-points are in the UK. Foreign travel may be voluntarily included at company discretion. The guidelines are silent regarding double counting when travelling to fellow EU states.
  5. The choice of sites to sample is at the discretion of the company and lead assessor. The findings of these audits must be applied across the board, and ?robust explanations? provided in the evidence pack for selection of specific sites. This is a departure from traditional emphasis on random.

The Environment Agency has provided the following checklist of what to keep in the evidence pack

  1. Contact details of participating and responsible undertakings
  2. Details of directors or equivalents who reviewed the assessment
  3. Written confirmation of this by these persons
  4. Contact details of lead assessor and the register they appear on
  5. Written confirmation by the assessor they signed the ESOS off
  6. Calculation of total energy consumption
  7. List of identified areas of significant consumption
  8. Details of audits and methodologies used
  9. Details of energy saving opportunities identified
  10. Details of methods used to address these opportunities / certificates
  11. Contracts covering aggregation or release of group members
  12. If less than twelve months of data used why this was so
  13. Justification for using this lesser time frame
  14. Reasons for including unverifiable data in assessments
  15. Methodology used for arriving at estimates applied
  16. If applicable, why the lead assessor overlooked a consumption profile

Check out: Ecovaro ? energy data analytics specialist 

Check our similar posts

Field service and its impact on your bottom line

There are many pointers to successful field service in any business. Generally, labour hours, parts, technician efficiency, performance indicators and other bunch of data are the most important. However, the icing on top is the total revenue. If you are in business, you must be cocksure that it’s making money, and when you don’t rake in enough you need to make some business decisions quick!

For the most part, field service companies will always have a field service management software to handle all the data. But how will this affect your outlook? 

Will this cause a direct increase in revenue? 

What will still need to be changed so that the ship stays afloat?

Increase your service jobs

As expected, the best field management software will guarantee a positive increase in appointments per week. On average, the field service team should expect at least a 50% increase in work turnover. There is a direct relation between the revenue you should be making and the number of calls in your schedule since the only way of making more cash is to get more work done. It is not recommended to raise costs because it increases the risk of losing customers easy when they can’t meet the extra expense. Field service software will help you bring in more customers and also manage technicians.

If you have much of the hard work done for you then you?d have more time to run the show. This is why premises are trying out software because they answer many problems like:

  • Automation and improved work order management
  • Fast dispatch from an array of drag-drop scheduling tools
  • Easy-to-use field service apps for technicians to receive and submit work orders
  • Can be integrated into account systems for faster billing time

Manual operations are costly and prone to error, and they don’t come cheap. Do away with them, reduce costs, sit back and watch as new customers steadily stream in. Grow the business by building lasting relations with your workforce and customers.

Increase technician?s abilities with mobile

If you want to get more profit, bank on technicians who complete service calls. Their task is obviously the hardest. They have an unpredictable job; at times they need to come up with quick responses or they may also be required to dig deep as well. The work does not need to be slowed with an endless paper trail while they could be elsewhere giving their all. These technicians require a working mobile field service management app.

As expected, field service leaders who use a mobile field service software report close to 20% increase in service visits per technician. This translates to each technician taking nearly a fifth more calls in a day. And as we had said before, more service calls can double the profits. How can technicians get extra time from a field service mobile app?

  • No need to drive to work to pick orders
  • Less time using the phone looking for service or parts information
  • Reduces the time needed to go through paper-based work
  • Less time driving to service calls because information is routed to their mobile phones

Increase revenue from technicians

If time is spent seamlessly, dispatchers will find time in a technician?s schedule for an extra service call. With all this being done within normal working hours, the business stands to increase its bottom line. This is what makes the business grow. Not by increasing technicians but by optimum utilisation of the current staff to get maximum profit. The logic is straightforward ? a technician working 8 hours each day taking six calls a day will make more revenue than the one who takes four, because they are paid the same each, but the business benefits from the extra service calls.


The business stands to make more revenue per technician if it uses field service management software. The margins can go as high as 40% because the technician has all tools needed to get the job done faster. You increase revenue from field work too. Let technicians benefit from automated process and have all the tools for work that they need right on their mobile devices.

The target is always your bottom line

When field service leaders inquire about field service software, they need to know how it affect the bottom line: how they will spend less time drafting schedules, how each technician will increase revenue, how the business will grow. Simple as that!
Field service management applications bring a lot to the table. 

Don’t waste your time crunching a lot of numbers or sorting out schedules since this is what such an application should do. Automation, optimisation and mobility are all ways of increasing revenue. Let us help you reach your goals using our top shelf field management software. This will not only help your bottom line but will let you have more time to venture into untapped potentials.

The General Data Protection Regulation & The Duty to use Encryption

The General Data Protection Regulation, abbreviated to GDPR, raised a storm when it arrived. In reality, it merely tightened up on existing good practice according to digital security specialists Gemalto. The right to withhold consent and to be forgotten has always been there, for example. However, the GDPR brings a free enforcement service for consumers, thus avoiding the need for third party, paid assistance.

The GDPR Bottom Lines for Data Security
Moreover, the GDPR has penalties it can apply, of the order that might have a judge choking on his wig. Under it, data security measures such as pseudonymisation (substitution of identifying fields) and encryption (encoding including password protection) have become mandatory. Businesses must further respect their client data by:

a) Storing it in a secure environment supported by robust services and systems

b) Having proven measures to restore availability and access after a breach

c) Being able to prove frequent effectiveness testing of these measures.

The General Data Protection Regulation places an onus on businesses to report any data breaches. This places us in a difficult situation. We must either face at least a wrist slap upon reporting failures. Alternatively, pay a fine of up to ?10 million, or 2% of total worldwide annual turnover.

The Engineered Weak Link in the System
Our greatest threat of breach is probably when the data leaves our secure environment, and travels across cyberspace to an employee, stakeholder, collaborator, or the client themselves. Since email became open to attack, businesses and individuals have turned to sharing platforms like Dropbox, Google Drive, Skydrive, and so on. While these do allow an additional layer of password protection, none of these has proved foolproof. The GDPR may still fine us heavily, whether or not we are to blame for the actual breach.

How Hacking is Approaching Being a Science
We may make a mistake we may regret, if we do not take hacking seriously. The 10 worst data hacks Identity Force lists are proof positive that spending lots of money does not guarantee security (any more than having the biggest stock of nuclear weapons). We have to be smart, and start thinking the way that hackers do.

Hacker heaven is finding an Experian or a Dun & Bradstreet that may have shielded 143 million, and 33 million consumer records respectively, behind a single, flimsy cyber-security door. Ignorance is no excuse for them. They should simply have known better. They should have rendered consumer data unreadable at individual record level. The hackers could have found this too demanding to unpick, and have looked elsewhere.

How Data Encryption Can Help Prevent Hackers Succeeding
Encrypting data is dashboard driven, and businesses need not concern themselves about it works. There are, however, a few basic decisions they must take:

a) Purge the database of all information held without explicit permission

b) Challenge the need for the remaining data and purge the nice-to-haves

c) Adopt a policy of encrypting access at business and customer interfaces

d) Register with three freemium encryption services that seem acceptable

e) After experimenting, sign up for a premium service and be prepared to pay

Factors to Consider When Reaching a Decision
Life Hacker?suggests the following criteria although the list is a one-size-fits-all

a) Is the system fast, simple, and easy to operate

b) Can you encrypt hidden volumes within volumes

c) Can you mass-encrypt a batch of files easily

d) Do all other files remain encrypted when you open one

e) Do files automatically re-encrypt when you close them

f) How confident are you with the vendor, on a scale of 1 to 10

It may be wise to encrypt all the files on your system, and not just your customer data. We are always open to a hack by the competition after our strategic planning. If we leave the decision up to IT, then IT, being human may take the easy way out, and encrypt as little as possible.

Contact Us

  • (+353)(0)1-443-3807 – IRL
  • (+44)(0)20-7193-9751 – UK
Data Replication

Medical Data Form

These days, not many companies can continue to operate once their entire computer system goes down. All the information needed in daily operations are stored in databases while the interfaces that make use of them all come in the form of software applications.

Software applications can be rapidly reinstalled and configured for as long as the necessary programs are available. Data, however, cannot be reconstructed as quickly even with hard copies available. It is therefore necessary to store your data in a replicated setup so that when one section goes down, operations can proceed without interruption.

For instance, if a category 5 hurricane renders your main office useless, you can simply rent workstations elsewhere, connect to the Internet and continue with your usual transactions for as long as data is readily accessible.

So how do we ensure the accessibility and reliability of your data? Here’s what we’ll do:

  • Activate data replication on your database management system. If your DBMS does not support replication, we’ll migrate all your data to one that does.
  • If absolutely necessary, we can allow modernised systems to run parallel to your legacy systems and prepare both for full modernisation when you’re ready.
  • Implement fail-over technologies where applicable to provide for automatic switching to a backup data server or network from one that has just failed.

We can also assist you with the following:

Ready to work with Denizon?