BES Cyber System Information definition

BES Cyber System Information means information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy statements. Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES Cyber Systems, Physical Access Control Systems, and Electronic Access Control or Monitoring Systems that is not publicly available and could be used to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.
BES Cyber System Information has the meaning set forth in Exhibit N. “Bulk Electric System” or “BES” has the meaning set forth in Exhibit N.
BES Cyber System Information means [*****] “Bulk Electric System” or “BES” means [*****] “Builder’s Risk Policy” has the meaning set forth in Section 9.1(i). “Business Continuity Plans” for the Work include (1) written disaster recovery plans for critical technology and infrastructure, including communications networks or manufacturing capability or capacity; (2) proper risk controls to enable continued performance under the Agreement in the event of a Disaster, and (3) demonstrated capability to provide uninterrupted Work during the Disaster within the recovery time objectives specified by the Company. “Business Day” means any day other than a Saturday, Sunday or a legal holiday in the State of California where the Work is performed. “CPUC” means the California Public Utilities Commission, or its regulatory successor, as applicable. “Change In Law” means, with respect to any portion of the Work performed in the State of California, the enactment, adoption, promulgation, modification, repeal, decision, determination, interpretation or administration after the date of this Agreement of any Applicable Law of any Government Authority of the State of California or the modification after the date of this Agreement of any Company Permit issued or promulgated by any Government Authority of the State of California that establishes requirements that materially and adversely affect Contractor’s costs or schedule for performing the Work;

Examples of BES Cyber System Information in a sentence

  • Upon written request by the Disclosing Party, the Receiving Party shall destroy or return to Disclosing Party all the Disclosing Party’s Confidential Information, except the Receiving Party shall be entitled to keep one copy of the Confidential Information in its archives, except that BES Cyber System Information kept in Contractor’s archives may only be kept for a maximum of four years after the Services are complete.

  • Requirement R2 of CIP-004-5 adds specific training roles for visitor control programs, electronic interconnectivity supporting the operation and control of BES Cyber Systems, and storage media as part of the treatment of BES Cyber System Information.

  • Classified all BES Cyber System Information for both production and non-production assets.URE certified that it had completed its Mitigation Plan, and WECC verified that URE had completed all mitigation activities.

  • BES CyberSystem Information review (at least once every4/17/110/11/11) Quarterly access review2) privilege review(at least once every 15 calendar months)3) BES Cyber System Information review15 calendar months)Quarterly access reviewQuarterly access reviewQuarterly access review(at least once every15 calendar months)2/1 3/1 4/1 5/1 6/1 7/1 8/1 9/1 10/1 11/1 12/11/1 1/1assignments cannot be performed.

  • They also contend that United Ohio acted in bad faith when it filed the declaratory judgment action without providing Willey independent counsel.{¶24} We have found no Ohio precedent that discusses the requirements for a successful bad faith action based on the unique allegations made in this case.

  • BES CyberSystem Information review (at least once every4/17/110/11/11) Quarterly access review2) privilege review(at least once every 15 calendar months)3) BES Cyber System Information review15 calendar months)Quarterly access reviewQuarterly access reviewQuarterly access review(at least once every15 calendar months)2/1 3/1 4/1 5/1 6/1 7/1 8/1 9/1 10/1 11/1 12/11/1 1/1perform the privilege review on individual accounts.

  • Physical or electronic access by any individual to PG&E BES Cyber System Information (BCSI), or administrative control over BCSI or systems containing BCSI.

  • BES CyberSystem Information review (at least once every4/17/110/11/11) Quarterly access review2) privilege review(at least once every 15 calendar months)3) BES Cyber System Information review15 calendar months)Quarterly access reviewQuarterly access reviewQuarterly access review(at least once every15 calendar months)2/1 3/1 4/1 5/1 6/1 7/1 8/1 9/1 10/1 11/1Pa1g2e/143 of 531/1 1/1assignments cannot be performed.

  • Also notwithstanding Section 16.3(A)(1), above, if Contractor breaches any material term or condition of this Agreement on a NERC CIP Project or a project involving BES Cyber System Information, Edison shall have the right to immediately terminate the Agreement for cause and without liability to Edison.

  • Requirement R1 specifies information protection controls to prevent unauthorized access to BES Cyber System Information.


More Definitions of BES Cyber System Information

BES Cyber System Information means information about the BES cyber system that could be used to gain unauthorized access or pose a security threat to the BES cyber system. BES cyber system information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access to BES cyber systems, such as, but not limited to, device names, individual IP addresses without context, electronic security perimeter names, or policy statements.
BES Cyber System Information means information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, Electronic Security Perimeter names, or policy statements. Examples of BES Cyber Asset Information include security procedures or security information about BES Cyber Systems, physical access control systems, and electronic access control or monitoring systems that are not publicly available and could be used to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.

Related to BES Cyber System Information

  • Confidential System Information means any communication or record (whether oral, written, electronically stored or transmitted, or in any other form) provided to or made available to Grantee; or that Grantee may create, receive, maintain, use, disclose or have access to on behalf of HHSC or through performance of the Project, which is not designated as Confidential Information in a Data Use Agreement.

  • Customer Proprietary Network Information (“CPNI”) is as defined in the Act.

  • Appendix Information means the information which must be provided for the selected modules as set out in the Appendix of the Approved EU SCCs (other than the Parties), and which for this Addendum is set out in:

  • Program Information has the meaning set forth in Section 14.8.

  • Data Room Information means the information and documents listed in the index of documents contained in the Data Site attached to the Company Disclosure Letter;

  • Information processing system means an electronic system for creating, generating, sending, receiving, storing, displaying, or processing information.

  • Staffing Information in relation to all persons identified on the Supplier's Provisional Supplier Personnel List or Supplier's Final Supplier Personnel List, as the case may be, such information as the Department may reasonably request (subject to all applicable provisions of the DPA), but including in an anonymised format: (a) their ages, dates of commencement of employment or engagement, gender and place of work; (b) details of whether they are employed, self employed contractors or consultants, agency workers or otherwise; (c) the identity of the employer or relevant contracting Party; (d) their relevant contractual notice periods and any other terms relating to termination of employment, including redundancy procedures, and redundancy payments; (e) their wages, salaries, bonuses and profit sharing arrangements as applicable; (f) details of other employment-related benefits, including (without limitation) medical insurance, life assurance, pension or other retirement benefit schemes, share option schemes and company car schedules applicable to them; (g) any outstanding or potential contractual, statutory or other liabilities in respect of such individuals (including in respect of personal injury claims); (h) details of any such individuals on long term sickness absence, parental leave, maternity leave or other authorised long term absence; (i) copies of all relevant documents and materials relating to such information, including copies of relevant Agreements of employment (or relevant standard Agreements if applied generally in respect of such employees); and (j) any other “employee liability information” as such term is defined in regulation 11 of the Employment Regulations;

  • Benchmarking Information means information generated by Portfolio Manager, as herein defined including descriptive information about the physical building and its operational characteristics.

  • Client Information means any data, information, software or other materials that you provide to Red Hat under the Agreement.

  • Customer information systems means any methods used to access, collect, store, use, transmit, protect, or dispose of customer in- formation.

  • Customer Usage Information means information regarding the historical electricity consumption of a Customer;

  • Data Tape Information The information provided by the Responsible Parties as of the Cut-off Date to the Depositor or the Sponsor setting forth the following information with respect to each Mortgage Loan: (1) the Mortgagor's name; (2) as to each Mortgage Loan, the Scheduled Principal Balance as of the Cut-off Date; (3) the Mortgage Rate Cap; (4) the Index; (5) a code indicating whether the Mortgaged Property is owner occupied; (6) the type of Mortgaged Property; (7) the first date on which the Scheduled Payment was due on the Mortgage Loan and, if such date is not consistent with the Due Date currently in effect, such Due Date; (8) the "paid through date" based on payments received from the related Mortgagor; (9) the original principal amount of the Mortgage Loan; (10) with respect to Adjustable Rate Mortgage Loans, the Maximum Mortgage Rate; (11) the type of Mortgage Loan (i.e., Fixed Rate or Adjustable Rate Mortgage Loan, First Lien Mortgage Loan or Second Lien Mortgage Loan); (12) a code indicating the purpose of the loan (i.e., purchase, rate and term refinance, equity take out refinance); (13) a code indicating the documentation style (i.e., full, asset verification, income verification and no documentation); (14) the credit risk score (FICO score); (15) the loan credit grade classification (as described in the underwriting guidelines); (16) with respect to each Adjustable Rate Mortgage Loan, the Minimum Mortgage Rate; (17) the Mortgage Rate at origination; (18) with respect to each Adjustable Rate Mortgage Loan, the first Adjustment Date immediately following the Cut-off Date; (19) the value of the Mortgaged Property; (20) a code indicating the type of Prepayment Charges applicable to such Mortgage Loan (including any prepayment penalty term), if any; (21) with respect to each Adjustable Rate Mortgage Loan, the Periodic Mortgage Rate Cap; (22) the applicable Responsible Party with respect to such Mortgage Loan; (23) with respect to each First Lien Mortgage Loan, the LTV at origination, and with respect to each Second Lien Mortgage Loan, the CLTV at origination; and (24) if such Mortgage Loan is covered by a primary mortgage insurance policy or a lender-paid primary mortgage insurance policy, the primary mortgage insurance rate. With respect to the Mortgage Loans in the aggregate, the Data Tape Information shall set forth the following information, as of the Cut-off Date: (1) the number of Mortgage Loans; (2) the current aggregate outstanding principal balance of the Mortgage Loans; (3) the weighted average Mortgage Rate of the Mortgage Loans; and (4) the weighted average maturity of the Mortgage Loans.

  • Billing information means any data that enables any person to access a customer’s or donor’s account, such as a credit card, checking, savings, share or similar account, utility bill, mort- gage loan account, or debit card.

  • Line Information Data Base (LIDB) means a transaction-oriented database system that functions as a centralized repository for data storage and retrieval. LIDB is accessible through CCS networks. LIDB contains records associated with End User line numbers and special billing numbers. LIDB accepts queries from other network elements and provides return result, return error, and return reject responses as appropriate. Examples of information that Account Owners might store in LIDB and in their Line Records are: ABS Validation Data, Originating Line Number Screening (OLNS) data, ZIP Code data, and Calling Name Information.

  • Regulatory Information Service means a regulatory information service as defined in the FCA Handbook;

  • Confidential commercial information means records provided to the govern- ment by a submitter that arguably contain material exempt from release under Exemption 4 of the Freedom of Information Act, 5 U.S.C. 552(b)(4), be- cause disclosure could reasonably be expected to cause substantial competi- tive harm.

  • User Information means User Compliance Information and User Financial Information.

  • Commercial Information means information regarding the purchase and sale of goods and services, including, but not limited to, information regarding marketing strategy, production data, assessments of goods and services, mineral exploration records, and compilations of data regarding commercial activity.

  • Ordering Information means (i) a reference to this Agreement; (ii) the Customer's name; (iii) the SAP Cloud Service for which Provider is ordering subscriptions for a specific Customer and the total number of Authorized Users (or other usage metric stated in the Order Form) for each product; (iv) the subscription fees due for the SAP Cloud Services and the length of the subscription term; the (v) Provider billing contact information and such other information as set forth in the form of the Order Form.

  • Contractor attributional/proprietary information means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company.

  • Service Information means information concerning the Services provided by the Contractor to the Authority in accordance with Clause 32.1 for inclusion in the Authority's catalogue and/or any Beneficiary's catalogue from time to time;

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • Contractor attributional/proprietary information means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company.

  • Product Information has the meaning specified in Section 10.12(a).

  • Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a Party receives from the other Party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information, and personal financial information (which may include a Masterworks user account number).

  • DXC Sensitive Information means DXC Confidential Information, Intellectual Property, PHI, DXC Customer data, and Personal Information.