What is waterOutlook used for? One cloud-based repository for all operational and compliance data that provides: Early warningsData storage/securityRisk reduction Get in touch Key Competencies Where we make a difference WaterOutlook provides the highest level of data integrity. We are independent and third-party audit grade. Data becomes information which drives behaviours. Operations Alerting/alarmingAutomated daily, weekly, monthly, yearly reportingIn-field data collectionIn-field dashboard/documentation for operators Show Case Examples Compliance Continuous regulatory parameter monitoringRegulatory reportingAutomatic data feeds to/from your regulator Show Case Examples Carbon Carbon accountingMonitoring of carbon production in real time field instrumentsUsing indirect carbon measurement Show Case Examples Energy Direct energy monitoringMeasurement of energy efficiency in productionA platform to assess process improvements. Show Case Examples KPIs Measure plant performance KPIsBenchmark a group of plant performanceMeasure contractor O&M performance Show Case Examples DATA CHAIN OF CUSTODY WaterOutlook simplifies the chain of custody and also provides a full audit trail of every action undertaken in the repository. For example, manual data has the full suite of metadata parameters to satisfy contemporary audit requirements. The full audit capabilities allow WaterOutlook clients to be paperless for compliance reporting. WaterOutlook works on the principle of working towards a chain of custody of one: whoever/whatever produces the data puts it in and whoever/whatever needs the data takes it out. SAFE AND SECURE DATA WaterOutlook handles mission critical information for our clients. Our system is designed around the highest standards for diversity and redundancy of storage systems. The independent nature of WaterOutlook creates a safe and fully auditable system for critical data. WaterOutlook is a custodian of data. Our clients own their data. WaterOutlook provides unprecedented data security via four layers of redundancy and diversity all the way to disconnected backups. This provides the highest levels of data security.