BES Cyber System Information definition

BES Cyber System Information means information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. BES Cyber System Information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access to BES Cyber Systems, such as, but not limited to, device names, individual IP addresses without context, ESP names, or policy statements. Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES Cyber Systems, Physical Access Control Systems, and Electronic Access Control or Monitoring Systems that is not publicly available and could be used to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.
BES Cyber System Information means information about the BES Cyber System that could be used to gain unauthorized access or pose a security threat to the BES Cyber System. Examples of BES Cyber System Information may include, but are not limited to, security procedures or security information about BES Cyber Systems, physical access control systems, and electronic access control or monitoring systems that are not publicly available and could be used to allow unauthorized access or unauthorized distribution; collections of network addresses; and network topology of the BES Cyber System.
BES Cyber System Information has the meaning set forth in Exhibit N. “Bulk Electric System” or “BES” has the meaning set forth in Exhibit N.

Examples of BES Cyber System Information in a sentence

  • Upon written request by the Disclosing Party, the Receiving Party shall destroy or return to Disclosing Party all the Disclosing Party’s Confidential Information, except the Receiving Party shall be entitled to keep one copy of the Confidential Information in its archives, except that BES Cyber System Information kept in Contractor’s archives may only be kept for a maximum of four years after the Services are complete.

  • Students are accountable for the completion of their own schoolwork – The Bespoke tutor and/or the teaching and learning lead will contact parents / carers if their child is not completing their schoolwork or their standard of work has noticeably decreased.

  • Classified all BES Cyber System Information for both production and non-production assets.URE certified that it had completed its Mitigation Plan, and WECC verified that URE had completed all mitigation activities.

  • BES CyberSystem Information review (at least once every4/17/110/11/11) Quarterly access review2) privilege review(at least once every 15 calendar months)3) BES Cyber System Information review15 calendar months)Quarterly access reviewQuarterly access reviewQuarterly access review(at least once every15 calendar months)2/1 3/1 4/1 5/1 6/1 7/1 8/1 9/1 10/1 11/1 12/11/1 1/1assignments cannot be performed.

  • Physical or electronic access by any individual to PG&E BES Cyber System Information (BCSI), or administrative control over BCSI or systems containing BCSI.

  • BES CyberSystem Information review (at least once every4/17/110/11/11) Quarterly access review2) privilege review(at least once every 15 calendar months)3) BES Cyber System Information review15 calendar months)Quarterly access reviewQuarterly access reviewQuarterly access review(at least once every15 calendar months)2/1 3/1 4/1 5/1 6/1 7/1 8/1 9/1 10/1 11/1Pa1g2e/143 of 531/1 1/1assignments cannot be performed.

  • Requirement R1 specifies information protection controls to prevent unauthorized access to BES Cyber System Information.

  • Also notwithstanding Section 16.3(A)(1), above, if Contractor breaches any material term or condition of this Agreement on a NERC CIP Project or a project involving BES Cyber System Information, Edison shall have the right to immediately terminate the Agreement for cause and without liability to Edison.

  • BES CyberSystem Information review (at least once every4/17/110/11/11) Quarterly access review2) privilege review(at least once every 15 calendar months)3) BES Cyber System Information review15 calendar months)Quarterly access reviewQuarterly access reviewQuarterly access review(at least once every15 calendar months)2/1 3/1 4/1 5/1 6/1 7/1 8/1 9/1 10/1 11/1 12/11/1 1/1perform the privilege review on individual accounts.

  • They also contend that United Ohio acted in bad faith when it filed the declaratory judgment action without providing Willey independent counsel.{¶24} We have found no Ohio precedent that discusses the requirements for a successful bad faith action based on the unique allegations made in this case.


More Definitions of BES Cyber System Information

BES Cyber System Information means [*****] “Bulk Electric System” or “BES” means [*****] “Builder’s Risk Policy” has the meaning set forth in Section 9.1(i). “Business Continuity Plans” for the Work include (1) written disaster recovery plans for critical technology and infrastructure, including communications networks or manufacturing capability or capacity; (2) proper risk controls to enable continued performance under the Agreement in the event of a Disaster, and (3) demonstrated capability to provide uninterrupted Work during the Disaster within the recovery time objectives specified by the Company. “Business Day” means any day other than a Saturday, Sunday or a legal holiday in the State of California where the Work is performed. “CPUC” means the California Public Utilities Commission, or its regulatory successor, as applicable. “Change In Law” means, with respect to any portion of the Work performed in the State of California, the enactment, adoption, promulgation, modification, repeal, decision, determination, interpretation or administration after the date of this Agreement of any Applicable Law of any Government Authority of the State of California or the modification after the date of this Agreement of any Company Permit issued or promulgated by any Government Authority of the State of California that establishes requirements that materially and adversely affect Contractor’s costs or schedule for performing the Work;
BES Cyber System Information means information about the BES cyber system that could be used to gain unauthorized access or pose a security threat to the BES cyber system. BES cyber system information does not include individual pieces of information that by themselves do not pose a threat or could not be used to allow unauthorized access to BES cyber systems, such as, but not limited to, device names, individual IP addresses without context, electronic security perimeter names, or policy statements.

Related to BES Cyber System Information

  • Contractor attributional/proprietary information means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company.

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • Customer Information means any information contained on a customer’s application or other form and all nonpublic personal information about a customer that a Party receives from the other Party. Customer Information shall include, but not be limited to, name, address, telephone number, social security number, health information, and personal financial information (which may include a Masterworks user account number).