BES Cyber System definition
Examples of BES Cyber System in a sentence
Upon written request by the Disclosing Party, the Receiving Party shall destroy or return to Disclosing Party all the Disclosing Party’s Confidential Information, except the Receiving Party shall be entitled to keep one copy of the Confidential Information in its archives, except that BES Cyber System Information kept in Contractor’s archives may only be kept for a maximum of four years after the Services are complete.
Additionally, if the Deliverable, or portion thereof, contains or is derived from BES Cyber System Information, Contractor shall also clearly ▇▇▇▇ the Deliverable as “Contains or Derives from Edison BES Cyber System Information.” Edison Confidential Information created by Contractor is subject to this Section 8 and the Cyber Policy.
Also notwithstanding Section 16.3(A)(1), above, if Contractor breaches any material term or condition of this Agreement on a NERC CIP Project or a project involving BES Cyber System Information, Edison shall have the right to immediately terminate the Agreement for cause and without liability to Edison.
Upon written request by the Disclosing Party, the Receiving Party shall destroy or return to Disclosing Party all the Disclosing Party’s Confidential Information, except the Receiving Party shall be entitled to keep one copy of the Confidential Information in its archives, except that BES Cyber System Information kept in Contractor’s archives may only be kept for a maximum of four years after the Work is complete.
Additionally, if the Deliverable, or portion thereof, contains or is derived from BES Cyber System Information, Contractor shall also clearly ▇▇▇▇ the Deliverable as “Contains or Derives from Edison BES Cyber System Information.” Edison Confidential Information created by Contractor is subject to this Section 8 and the Cyber Requirements.
To the extent that the Contractor is collecting, using, disseminating, or retaining Confidential Information Nonpublic Information or BES Cyber Security Information, in any format, or is using or operating any Central ▇▇▇▇▇▇ Information Technology System or Operational Technology System, including a BES Cyber System, in order to perform its responsibilities or obligations pursuant to the Master Agreement, then this Rider shall apply in full.
All non-public Edison Data, including but not limited to Critical Energy Infrastructure Information, BES Cyber System Information and EPI is SCE ’s Confidential Information (collectively, “Edison Confidential Information”) regardless of whether it is marked as “confidential” or “proprietary.” Edison Confidential Information shall also include the existence of the Agreement and its terms and conditions.
BES Cyber System Information (BCSI) shall mean information concerning CIPS Covered Assets that: (i) relates to the production, generation or transmission of energy; (ii) could be useful to a person planning an attack on critical infrastructure; and (iii) provides strategic information beyond the geographic location of the critical asset, and which is identified as BCSI by Company.
Additionally, if the Deliverable, or portion thereof, contains or is derived from BES Cyber System Information, Implementer shall also clearly mark the Deliverable as “Contains or Derives from Edison BES Cyber System Information.” Edison Confidential Information created by Implementer is subject to this Section 10 and the Cyber Requirements.
Additionally, if the Deliverable, or portion thereof, contains or is derived from BES Cyber System Information, Contractor shall also clearly mark the Deliverable as “Contains or Derives from Edison BES Cyber System Information.” Edison Confidential Information created by Contractor is subject to this Section 8 and the Cyber Policy.