Rod Dow and Karl Hochkammer will be leading a 90-minute breakfast program on Monday April 21, 2008 at Metering, Billing/CIS America 2008 in San Diego, CA. This is a national conference on advanced technology systems for utilities (including AMR/AMI, Meter Data Management, Billing and Customer Information Systems) Their program, “Contracting Best Practices” covers the following:
- pre-negotiation risk management
- vendor accountability
- incentives and intermediate remedies
- obsolescence
- clarity of scope/requirements
- acceptance testing
- third party issues
- pricing protection
- changes in vendor status
- and other issues of interest to the participants (as they determine)
Additionally, Mark Foley will be one of seven speakers at a workshop on Sunday, April 20, 2008. The name of the workshop is, “AMI Star Wars,” which will focus on security issues for Advanced Metering Infrastructure. Mark’s portion of the program is, “Barbarians Gate(way): Legal Risks and Opportunities for Advanced Metering Systems.
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.