Ontario tables legislation to lower electricity rates


lower Ontario electricity rates

Substation Relay Protection Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today

Ontario Clean Energy Adjustment lowers hydro bills by shifting global adjustment costs, cutting time-of-use rates, and using OPG debt financing; ratepayers get inflation-capped increases for four years, then repay costs over 20 years.

 

Key Points

A 20-year line item repaying debt used to lower rates for 10 years by shifting global adjustment costs off hydro bills.

✅ 17% average bill cut takes effect after royal assent

✅ OPG-managed entity assumes debt for 10 years

✅ 20-year surcharge repays up to $28B plus interest

 

Ontarians will see lowered hydro bills for the next 10 years, but will then pay higher costs for the following 20 years, under new legislation tabled Thursday.

Ten weeks after announcing its plan to lower hydro bills, the Liberal government introduced legislation to lower time-of-use rates, take the cost of low-income and rural support programs off bills, and introduce new social programs.

It will lower time-of-use rates by removing from bills a portion of the global adjustment, a charge consumers pay for above-market rates to power producers. For the next 10 years, a new entity overseen by Ontario Power Generation will take on debt to pay that difference.

Then, the cost of paying back that debt with interest -- which the government says will be up to $28 billion -- will go back onto ratepayers' bills for the next 20 years as a "Clean Energy Adjustment."

An average 17-per-cent cut to bills will take effect 15 days after the hydro legislation receives royal assent, even as a Nov. 1 rate increase was set by the Ontario Energy Board, but there are just eight sitting days left before the Ontario legislature breaks for the summer. Energy Minister Glenn Thibeault insisted that leaves the opposition "plenty" of time for review and debate.

Premier Kathleen Wynne promised to cut hydro bills and later defended a 25% rate cut after widespread anger over rising costs helped send her approval ratings to record lows.

Electricity bills in the province have roughly doubled in the last decade, due in part to green energy initiatives, and Thibeault said the goal of this plan is to better spread out those costs.

"Like the mortgage on your house, this regime will cost more as we refinance over a longer period of time, but this is a more equitable and fair approach when we consider the lifespan of the clean energy investments, and generating stations across our province," he said.

NDP critic Peter Tabuns called it a "get-through-the-election" next June plan.

"We're going to take on a huge debt so Kathleen Wynne can look good on the hustings in the next few months and for decades we're going to pay for it," he said.

The legislation also holds rate increases to inflation for the next four years. After that, they'll rise more quickly, as illustrated by a leaked cabinet document the Progressive Conservatives unveiled Thursday.

The Liberals dismissed the document as containing outdated projections, but confirmed that it went before cabinet at some point before the government decided to go ahead with the hydro plan.

From about 2027 onward -- when consumers would start paying off the debt associated with the hydro plan -- Ontario electricity consumers will be paying about 12 per cent more than they would without the Liberal government's plan to cut costs in the short term, even though a deal with Quebec was not expected to reduce hydro bills, the government document projected.

But that was just one of many projections, said Energy Minister Glenn Thibeault.

"We have been working on this plan for months, and as we worked on it the documents and calculations evolved," he said.

The government's long-term energy plan is set to be updated this spring, and Thibeault said it will provide a more accurate look at how the hydro plan will reduce rates, even as a recovery rate could lead to higher hydro bills in certain circumstances.

Progressive Conservative critic Todd Smith said the "Clean Energy Adjustment" is nothing more than a revamped debt retirement charge, which was on bills from 2002 to 2016 to pay down debt left over from the old Ontario Hydro, the province's giant electrical utility that was split into multiple agencies in 1999 under the previous Conservative government.

"The minister can call it whatever he wants but it's right there in the graph, that there is going to be a new charge on the line," Smith said. "It's the debt retirement charge on steroids."

 

 

Related News

Related News

Three New Solar Electricity Facilities in Alberta Contracted At Lower Cost than Natural Gas

Alberta Solar Energy Contracts secure low-cost photovoltaic PPAs for government operations, delivering renewable electricity at 4.8 cents/kWh, beating natural gas LCOE, enhancing summer grid efficiency across Hays, Tilley, and Jenner with Canadian Solar.

 

Key Points

Low-cost PV power agreements meeting 55% of Alberta government electricity demand via new Canadian Solar facilities.

✅ Price: 4.8 cents/kWh CAD, under gas-fired generation LCOE.

✅ Sites: Hays, Tilley, Jenner; 50% equity with Conklin Métis Local #193.

✅ Supplies 55% of provincial government electricity demand.

 

Three new solar electricity facilities to be built in south eastern Alberta (Canada) amid Alberta's solar growth have been selected through a competitive process to supply the Government of Alberta with 55 per cent of their annual electricity needs. The facilities will be built near Hays, Tilley, and Jenner, by Canadian Solar with Conklin Métis Local #193 as 50-percent equity owners.

The Government of Alberta's operations have been powered 100 per cent with wind power since 2007. Upon the expiration of some of these contracts, they have been renewed to switch from wind to solar energy. The average contract pricing will be $0.048 per kilowatt hour (3.6 cents/kWh USD), which is less than the average historical wholesale power pool price paid to natural gas-fired electricity in the province in years 2008 - 2018.

"The conversation about solar energy has long been fixated on its price competitiveness with fossil fuels," said John Gorman, CanSIA President & CEO. "Today's announcement demonstrates that low cost solar energy has arrived as a mainstream option in Alberta, even as demand for solar lags in Canada according to federal assessments. The conversation should next focus on how to optimize an all-of-the-above strategy for developing the province's renewable and non-renewable resources."

"This price discovery is monumental for the solar industry in Canada" said Patrick Bateman, CanSIA Director of Policy & Market Development. "At less than five cents per kilowatt hour, this solar electricity has a cost that is less than that of natural gas. Achieving Alberta's legislated 30 per cent by 2030 renewable electricity target just became a whole lot cheaper!".

 

Quick Facts:

  • The contract price of 4.8 cents/kWh CAD to be paid by Alberta Infrastructure for this solar electricity represents a lower Levelized Cost of Electricity (LCOE) than the average annual wholesale price paid by the power pool to combined-cycle and single-cycle natural gas-fired electricity generation which was 7.1 cents/kWh and 11.2 cents/kWh respectively from 2008 - 2018.
  • Alberta receives more hours of sunshine than Miami, Florida in the summer months. Alberta's electricity supply is most strained in summer, highlighting challenges for solar expansion when high temperatures increase the resistance of the distribution and transmission systems, and reduce the efficiency of cooling thermal power plants. For this reason, solar facilities sited near to electricity demand improves overall grid efficiency. Supply shortages are atypical in Alberta in winter when solar energy is least available. When they do occur, imports are increased and large loads are decreased.
  • In 2018, Alberta's solar electricity generation exceeded 50 MW. While representing much less than 1% of the province's electricity supply today, the Canadian Solar Industries Association (CanSIA) forecasts that solar energy could supply as much as 3 per cent of the province's electricity by 2030, supporting renewable energy job growth across Alberta. A recent supply chain study of the solar electricity sector in Alberta by Solas Energy Consulting Inc. found a potential of $4.1 billion in market value and a labour force rising to 10,000 in 2030.

 

To learn more about solar energy and the best way for consumers to go solar, please visit the Canadian Solar Industries Association at www.CanSIA.ca.

 

Related News

View more

Purdue: As Ransomware Attacks Increase, New Algorithm May Help Prevent Power Blackouts

Infrastructure Security Algorithm prioritizes cyber defense for power grids and critical infrastructure, mitigating ransomware, blackout risks, and cascading failures by guiding utilities, regulators, and cyber insurers on optimal security investment allocation.

 

Key Points

An algorithm that optimizes security spending to cut ransomware and blackout risks across critical infrastructure.

✅ Guides utilities on optimal security allocation

✅ Uses incentives to correct human risk biases

✅ Prioritizes assets to prevent cascading outages

 

Millions of people could suddenly lose electricity if a ransomware attack just slightly tweaked energy flow onto the U.S. power grid, as past US utility intrusions have shown.

No single power utility company has enough resources to protect the entire grid, but maybe all 3,000 of the grid's utilities could fill in the most crucial security gaps if there were a map showing where to prioritize their security investments.

Purdue University researchers have developed an algorithm to create that map. Using this tool, regulatory authorities or cyber insurance companies could establish a framework for protecting the U.S. power grid that guides the security investments of power utility companies to parts of the grid at greatest risk of causing a blackout if hacked.

Power grids are a type of critical infrastructure, which is any network - whether physical like water systems or virtual like health care record keeping - considered essential to a country's function and safety. The biggest ransomware attacks in history have happened in the past year, affecting most sectors of critical infrastructure in the U.S. such as grain distribution systems in the food and agriculture sector and the Colonial Pipeline, which carries fuel throughout the East Coast, prompting increased military preparation for grid hacks in the U.S.

With this trend in mind, Purdue researchers evaluated the algorithm in the context of various types of critical infrastructure in addition to the power sector, including electricity-sector IoT devices that interface with grid operations. The goal is that the algorithm would help secure any large and complex infrastructure system against cyberattacks.

"Multiple companies own different parts of infrastructure. When ransomware hits, it affects lots of different pieces of technology owned by different providers, so that's what makes ransomware a problem at the state, national and even global level," said Saurabh Bagchi, a professor in the Elmore Family School of Electrical and Computer Engineering and Center for Education and Research in Information Assurance and Security at Purdue. "When you are investing security money on large-scale infrastructures, bad investment decisions can mean your power grid goes out, or your telecommunications network goes out for a few days."

Protecting infrastructure from hacks by improving security investment decisions

The researchers tested the algorithm in simulations of previously reported hacks to four infrastructure systems: a smart grid, industrial control system, e-commerce platform and web-based telecommunications network. They found that use of this algorithm results in the most optimal allocation of security investments for reducing the impact of a cyberattack.

The team's findings appear in a paper presented at this year's IEEE Symposium on Security and Privacy, the premier conference in the area of computer security. The team comprises Purdue professors Shreyas Sundaram and Timothy Cason and former PhD students Mustafa Abdallah and Daniel Woods.

"No one has an infinite security budget. You must decide how much to invest in each of your assets so that you gain a bump in the security of the overall system," Bagchi said.

The power grid, for example, is so interconnected that the security decisions of one power utility company can greatly impact the operations of other electrical plants. If the computers controlling one area's generators don't have adequate security protection, as seen when Russian hackers accessed control rooms at U.S. utilities, then a hack to those computers would disrupt energy flow to another area's generators, forcing them to shut down.

Since not all of the grid's utilities have the same security budget, it can be hard to ensure that critical points of entry to the grid's controls get the most investment in security protection.

The algorithm that Purdue researchers developed would incentivize each security decision maker to allocate security investments in a way that limits the cumulative damage a ransomware attack could cause. An attack on a single generator, for instance, would have less impact than an attack on the controls for a network of generators, which sophisticated grid-disruption malware can target at scale, rather than for the protection of a single generator.

Building an algorithm that considers the effects of human behavior

Bagchi's research shows how to increase cybersecurity in ways that address the interconnected nature of critical infrastructure but don't require an overhaul of the entire infrastructure system to be implemented.

As director of Purdue's Center for Resilient Infrastructures, Systems, and Processes, Bagchi has worked with the U.S. Department of Defense, Northrop Grumman Corp., Intel Corp., Adobe Inc., Google LLC and IBM Corp. on adopting solutions from his research. Bagchi's work has revealed the advantages of establishing an automatic response to attacks, and analyses like Symantec's Dragonfly report highlight energy-sector risks, leading to key innovations against ransomware threats, such as more effective ways to make decisions about backing up data.

There's a compelling reason why incentivizing good security decisions would work, Bagchi said. He and his team designed the algorithm based on findings from the field of behavioral economics, which studies how people make decisions with money.

"Before our work, not much computer security research had been done on how behaviors and biases affect the best defense mechanisms in a system. That's partly because humans are terrible at evaluating risk and an algorithm doesn't have any human biases," Bagchi said. "But for any system of reasonable complexity, decisions about security investments are almost always made with humans in the loop. For our algorithm, we explicitly consider the fact that different participants in an infrastructure system have different biases."

To develop the algorithm, Bagchi's team started by playing a game. They ran a series of experiments analyzing how groups of students chose to protect fake assets with fake investments. As in past studies in behavioral economics, they found that most study participants guessed poorly which assets were the most valuable and should be protected from security attacks. Most study participants also tended to spread out their investments instead of allocating them to one asset even when they were told which asset is the most vulnerable to an attack.

Using these findings, the researchers designed an algorithm that could work two ways: Either security decision makers pay a tax or fine when they make decisions that are less than optimal for the overall security of the system, or security decision makers receive a payment for investing in the most optimal manner.

"Right now, fines are levied as a reactive measure if there is a security incident. Fines or taxes don't have any relationship to the security investments or data of the different operators in critical infrastructure," Bagchi said.

In the researchers' simulations of real-world infrastructure systems, the algorithm successfully minimized the likelihood of losing assets to an attack that would decrease the overall security of the infrastructure system.

Bagchi's research group is working to make the algorithm more scalable and able to adapt to an attacker who may make multiple attempts to hack into a system. The researchers' work on the algorithm is funded by the National Science Foundation, the Wabash Heartland Innovation Network and the Army Research Lab.

Cybersecurity is an area of focus through Purdue's Next Moves, a set of initiatives that works to address some of the greatest technology challenges facing the U.S. Purdue's cybersecurity experts offer insights and assistance to improve the protection of power plants, electrical grids and other critical infrastructure.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Parked Electric Cars Earn $1,530 From Europe's Power Grids

Vehicle-to-Grid Revenue helps EV owners earn income via V2G, demand response, and ancillary services by exporting stored energy, supporting grid balancing, smart charging, and renewable integration with two-way charging infrastructure.

 

Key Points

Income EV owners earn by selling battery power to the grid for balancing, response, and flexibility services.

✅ Earn up to about $1,530 annually in Denmark trials

✅ Requires V2G-compatible EVs and two-way smart chargers

✅ Provides ancillary services and supports renewable integration

 

Electric car owners are earning as much as $1,530 a year just by parking their vehicle and feeding excess power back into the grid, effectively selling electricity back to the grid under V2G schemes.

Trials in Denmark carried out by Nissan and Italy’s biggest utility Enel Spa showed how batteries inside electric cars could, using vehicle-to-grid technology, help balance supply and demand at times and provide a new revenue stream for those who own the vehicles.

Technology linking vehicles to the grid marks another challenge for utilities already struggling to integrate wind and solar power into their distribution system. As the use of plug-in cars spreads, grid managers will have to pay closer attention and, with proper management, to when motorists draw from the system and when they can smooth variable flows.

For example, California's grid stability efforts include leveraging EVs as programs expand.

“If you blindingly deploy in the market a massive number of electric cars without any visibility or control over the way they impact the electricity grid, you might create new problems,” said Francisco Carranza, director of energy services at Nissan Europe in an interview with Bloomberg New Energy Finance.


 

While the Tokyo-based automaker has trials with more than 100 cars across Europe, only those in Denmark are able to earn money by feeding power back into the grid. There, fleet operators collected about 1,300 euros ($1,530) a year using the two-way charge points, said Carranza.

Restrictions on accessing the market in the U.K. means the company needs to reach about 150 cars before they can get paid for power sent back to the grid. That could be achieved by the end of this year, he said.

“It’s feasible,” he said. “It’s just a matter of finding the appropriate business model to deploy the business wide-scale.’’

Electric car demand globally is expected to soar, challenging state power grids and putting further pressure on grid operators to find new ways of balancing demand. Power consumption from vehicles will grow to 1,800 terawatt-hours in 2040 from just 6 terawatt-hours now, according to Bloomberg New Energy Finance.

 

Related News

View more

Ontario's electricity 'recovery rate' could lead to higher hydro bills

Ontario Hydro Flat Rate sets a single electricity rate at 12.8 cents per kWh, replacing time-of-use pricing for Ontario ratepayers, affecting hydro bills this summer, alongside COVID-19 Energy Assistance Program support.

 

Key Points

A fixed 12.8 cents per kWh electricity price replacing time-of-use rates across Ontario from June to November.

✅ Single rate applies 24/7, replacing time-of-use pricing

✅ May slightly raise bills versus pre-pandemic usage patterns

✅ COVID-19 aid offers one-time credits for households, small firms

 

A new provincial COVID-19 measure, including a fixed COVID-19 hydro rate designed to give Ontario ratepayers "stability" on their hydro bills this summer, could result in slightly higher hydro costs over the next four months.

Ontario Premier Doug Ford's government announced over the weekend that consumers would be charged a single around-the-clock electricity rate between June and November, before a Nov. 1 rate increase takes effect, replacing the much-derided time-of-use model ratepayers have complained about for years.

Instead of being charged between 10 to 20 cents per kilowatt hour, depending on the time of day electricity is used, including ultra-low TOU rates during off-peak hours, hydro users will be charged a blanket rate of 12.8 cents per kWh.

"The new rate will simply show up on your bill," Premier Doug Ford said at a Monday afternoon news conference.

While the government said the new fixed rate would give customers "greater flexibility" to use their home appliances without having to wait for the cheapest rate -- and has tabled legislation to lower rates as part of its broader plan -- the new policy also effectively erases a pandemic-related hydro discount for millions of consumers.

For example, a pre-pandemic bill of $59.90 with time-of-use rates, will now cost $60.28 with the government's new recovery rate, as fixed pricing ends across the province, before delivery charges, rebates and taxes.

That same bill would have been much cheaper -- $47.57 -- if the government continued applying the lowest tier of time-of-use 24/7 under an off-peak price freeze as it had been doing since March 24.

The government also introduced support for electric bills with two new assistance programs to help customers struggling to pay their bills.

The COVID-19 Energy Assistance Program will provide a one-time payment consumers to help pay off electricity debt incurred during the pandemic -- which will cost the government $9 million.

The government will spend another $8 million to provide similar assistance to small businesses hit hard by the pandemic.

 

Related News

View more

California Public Utilities Commission sides with community energy program over SDG&E

CPUC Decision on San Diego Community Power directs SDG&E to use updated forecasts, stabilizing electricity rates for CCA customers and supporting clean energy in San Diego with accurate rate forecasting and reduced volatility.

 

Key Points

A CPUC ruling directing SDG&E to use updated forecasts to ensure accurate, stable CCA rates and limit volatility.

✅ Uses 2021 sales forecasts for rate setting

✅ Aims to prevent undercollection and bill spikes

✅ Levels changes across customer classes

 

The California Public Utilities Commission on Thursday sided with the soon-to-launch San Diego community energy program in a dispute it had with San Diego Gas & Electric.

San Diego Community Power — which will begin to purchase power for customers in San Diego, Chula Vista, La Mesa, Encinitas and Imperial Beach later this year — had complained to the commission that data SDG&E intended to use to calculate rates, including community choice exit fees that could make the new energy program less attractive to prospective customers.

SDG&E argued it was using numbers it was authorized to employ as part of a general rate case amid a potential rate structure revamp that is still being considered by the commission.

But in a 4-0 vote, the commission, or CPUC, sided with San Diego Community Power and directed SDG&E to use an updated forecast for energy sales.

"This was not an easy decision," said CPUC president Marybel Batjer at the meeting, held remotely due to COVID-19 restrictions. "In my mind, this outcome best accounts for the shifting realities ... in the San Diego area while minimizing the impact on ratepayers during these difficult financial times."

In filings to the commission, SDG&E predicted a rate decrease of 12.35 percent in the coming year. While that appears to be good news for customers, Californians still face soaring electricity prices statewide, Commissioner Martha Guzman Aceves said the data set SDG&E wanted to use would lead to an undercollection of $150 million to $260 million.

That would result in rates that would be "artificially low," Guzman Aceves said, and rates "would inevitably go up quite a bit after the undercollection was addressed."

San Diego Community Power, or SDCP, said the temporary reduction would make its rates less attractive than SDG&E's, especially amid SDG&E's minimum charge proposal affecting low-usage customers, just as it is about to begin serving customers. SDCP's board members wrote an open letter last month to the commission, accusing the utility of "willful manipulation of data."

Working with an administrative law judge at the CPUC, Guzman Aceves authored a proposal requiring SDG&E to use numbers based on 2021 forecasts, as regulators simultaneously weigh whether the state needs more power plants to ensure reliability. The utility argued that could result in an increase of "roughly 40 percent" for medium and large commercial and industrial customers this year.

To help reduce potential volatility, Guzman Aceves, SDCP and other community energy supporters called for using a formula that would average out changes in rates across customer classes amid debates over income-based utility charges statewide. That's what the commissioners OK'd Thursday.

"It is essential that customer commodity rates be as accurate as we can possibly get them to avoid undercollections," said Commissioner Genevieve Shiroma.

San Diego Community Power is one of 23 community choice aggregation, or CCA, energy programs that have launched in California in the past decade.

CCAs compete with traditional power companies amid California's evolving power competition landscape, in one important role — purchasing power for a given community. They were created to boost the use of cleaner energy sources, such as wind and solar, at rates equal to or lower than investor-owned utilities.

However, CCAs do not replace utilities because the incumbent power companies still perform all of the tasks outside of power purchasing, such as transmission and distribution of energy and customer billing.

When a CCA is formed, California rules stipulate the utility customers in that area are automatically enrolled in the CCA. If customers prefer to stay with their previous power company, they can opt out of joining the CCA.

The shift of customers from SDG&E to San Diego Community Power is expected to be large. The total number of accounts for SDCP is expected to be 770,000, which would make it the second-largest CCA in the state. That's why SDCP considered Thursday's CPUC decision to be so important.

"At a time when customers are choosing between sticking with San Diego Gas & Electric and migrating to a CCA, we want them to have accurate bill information," said Commissioner Clifford Rechtschaffen.

"SDCP is very happy with today's CPUC decision, and that the commissioners shared our goal of limiting rate volatility for businesses and families in the region," said SDCP interim CEO Bill Carnahan. "This is definitely a win for accurate rate forecasting, and our mutual customers, and we look forward to working with SDG&E on next steps."

In an email, SDG&E spokeswoman Helen Gao said, "We are committed to continuing to work collaboratively with local Community Choice Aggregation programs to support their successful launch in 2021 and ensure that our mutual customers receive excellent customer service."

San Diego Community Power's case before the CPUC was joined by the California Community Choice Association, a trade group advocating for CCAs, and the Clean Energy Alliance — the North County-based CCA representing Del Mar, Solana Beach and Carlsbad that is scheduled to launch this summer.

SDCP will begin its rollout this year, folding in about 71,000 municipal, commercial and industrial accounts. The bulk of its roughly 700,000 residential accounts is expected to come in January 2022.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.