Cyber Asset definition
Examples of Cyber Asset in a sentence
In addition, all such design and operational changes required to comply with the obligations of being a Critical Cyber Asset must be completed at least sixty (60) days prior to the O&M Commencement Date.
Any Cyber Asset (as defined in the Glossary of Terms Used in NERC Reliability Standards, as amended) that is to be connected to Owner’s industrial control system and/or operational technology and is used for the purpose of performing the Work under this Contract is subject to the compliance requirements of NERC CIP-003-7, attachment 1, section 5.2. Accordingly, the method(s) of mitigation of malicious code must be thoroughly documented and provided to Owner.
SCE’s RTU is a BES Cyber Asset and the Interconnection Customer shall cooperate with the SCE in implementing and adhering to required security protections in accordance with Applicable Reliability Standards.
Ensure that the individual has completed initial cyber security training provided by, specified or pre-approved by GTC; and Submit a completed Cyber Asset Access Authorization Request (“CAAAR”) form to the email address indicated in the Documentation section below.
Critical Cyber Assets Those certain cyber assets as defined by NERC CIP Standard CIP-002-3-Cyber Security-Critical Cyber Asset Identification.
Except as disclosed on Schedule 3(K) attached hereto and captioned "Cyber Asset Dispositions," there have been no dispositions by Cyber of any material assets owned by Cyber as of June 30, 2000, except in the Ordinary Course of Business, and Cyber has made no reduction in the book value of any of its assets except to reflect depreciation per the depreciation schedule applied to such assets.
If the IT Work involves establishment or maintenance of remote access to a TVA Cyber Asset (either interactive or to and from an external Cyber Asset), Contractor shall (i) comply with TVA Cyber Asset requirements and preconditions, and (ii) coordinate with TVA to establish controls around, any such remote access to TVA Cyber Assets.
The Cyber Asset to be connected to the BES Cyber Asset(s) (as defined in the Glossary of Terms Used in NERC Reliability Standards, as amended) must adhere to all the requirements as defined in Owner’s Transient Cyber Asset (TCA) checklist.
OPG may use independent third- parties or OPG personnel to conduct assessments of systems, components, products, tools, and services to uncover vulnerabilities prior to accepting the Priority One Cyber Asset or Priority One Cyber Services.
One requirement of the NERC CIP standards is that each employee, contractor, or supplier having authorized cyber or unescorted physical access to any Critical Cyber Asset (CCA) must complete annual cyber security training.