Security Protocols

Write Quick, Inc.
NONDISCLOSURE AGREEMENT

(Scroll down to Accept or Cancel)

You should carefully read the following terms and conditions before opening this package. By opening this package you indicate your acceptance of these terms and conditions. If you do not agree with them, promptly return the package unopened. Thank you.

Recipient agrees as follows:
1. Restrictions on Use and Disclosure. Recipient shall: (i) protect the Document by using the same degree of care, but not less than a reasonable degree of care, to prevent the unauthorized use, dissemination or publication of the information contained therein as the Recipient uses to protect its own or any other party’s confidential or proprietary information; (ii) not copy, reproduce, create derivative works from, or use for competitive purposes any of the information contained in the Document; and (iii) not directly or indirectly disclose the existence, content, and/or substance of any of the information contained in the Document to any third party without specific written direction or consent of a duly authorized representative of Write Quick, Inc.

2. Ownership/No Warranty. All materials within shall be and remain the property of Write Quick, Inc.; this Agreement does not grant or confer any rights by license or otherwise, expressly or impliedly, to Recipient. The information in the Document is delivered “AS IS”, and all representations or warranties, whether express or implied, including warranties or conditions for fitness for a particular purpose, merchantability, title and non-infringement are hereby disclaimed.

3. Breach. In the event of Recipient’s breach or threatened breach of any of the provisions hereof, an action at law for damages would not be adequate to protect the rights of Write Quick, Inc. Therefore, in the event of a breach or threatened breach Write Quick, Inc. shall be entitled to injunctive and/or other equitable relief to prevent a breach thereof and to secure enforcement, which shall be in addition to any other rights of Write Quick, Inc.

4. No Assignment/Survival. Recipient shall not have the right to assign this Agreement (or any portion hereof) or disclose the information contained in the Document to any assignee or potential assignee without the prior written consent of Write Quick, Inc. Obligations created herein shall survive change or termination of the parties’ business relationship.

5. Miscellaneous. This Agreement contains an agreement between Write Quick, Inc. and Recipient concerning the information contained in the Document. No change, modification, waiver, or alteration of this Agreement shall be binding on Write Quick, Inc. unless approved by it in writing. This Agreement and all terms and conditions hereof shall be construed and in all respects governed by the internal substantive laws of the State of California. The parties understand that nothing herein requires either party to proceed with any proposed transaction or relationship in connection with which information in the Document may be disclosed. The act of opening the enclosed sealed envelope containing the Document shall be considered acceptance of these terms. If you do not so agree, please return the envelope unopened to Write Quick, Inc.

Write Quick, Inc.
110 Grant Avenue, Petaluma, CA 94952

By clicking on Accept you agree to abide by this agreement.

To view the Security Protocols research notes, click the image below. (Document opens in new browser tab/window.)

Audience

OpenSG users group (osgug.ucaiug.org) members who are developing security recommendations for smart grid devices.

Purpose

I wrote the these research notes (in collaboration with Mocana’s representative in the OpenSG users group) to provide historical context, applicability of protocols for particular problems, and strengths and weaknesses information about a variety of protocols under consideration for recommendations.

Comments

The primary challenge in writing this document was digging up information about proprietary protocols. Particularly in the area of security, the energy industry is reluctant to publish information that could expose vulnerabilities. As evidenced by the TBD items, these research notes were not intended to be a “final” document, but served to help the group complete their task.

These research notes are available directly from the OpenSG users group, UCA_Security_Protocol. (Link checked January 3, 2014)