OPG Systems and Information definition

OPG Systems and Information means OPG’s networks, information systems, industrial control systems, or any components thereof (including computing hardware, software, firmware or other computing or information technology), or any OPG Data.
OPG Systems and Information means OPG’s network(s), information systems, industrial control systems, or any components thereof (including computing hardware, software or other computing or information technology), and any OPG Data.
OPG Systems and Information means OPG’s network(s), information systems, industrial control systems, or any components thereof, or any of OPG’s information. If the Contractor is performing Cyber Services, providing any Cyber Deliverables, or is using any Cyber Equipment, the Contractor:

More Definitions of OPG Systems and Information

OPG Systems and Information means OPG’s network(s), information systems, industrial control systems, or any components thereof (including computing hardware, software or other computing or information technology), and any OPG Data. 1.2 Cyber Security Requirements. The Contractor: (a) represents and warrants to OPG that: (i) the Contractor has a written and enforceable cyber security policy, and has established and maintains a cyber security program that is designed and implemented to prevent, detect and respond to cyber attacks that may impact OPG Systems and Information; and (ii) the Contractor’s Personnel (which, for the purposes of these requirements, includes any of the Contractor’s personnel having access to OPG Systems and Information) have completed position-appropriate cyber security training; (b) will immediately revoke all access to OPG Systems and Information for any of the Contractor’s Personnel who is terminated or no longer needs access to OPG Systems and Information; (c) will notify OPG by sending an email to sccs@opg.com within 48 hours after discovering any security breach, incident or vulnerability impacting or otherwise involving OPG Systems and Information (including any Cyber Equipment if the Contractor, actingreasonably, believes any such security breach, incident or vulnerability may have impacted or may potentially impact OPG Systems and Information), and furthermore if such security breach, incident or vulnerabilities relates to any Cyber Asset, Cyber Equipment, or Cyber Service, the Contractor will also: (i) include in such written notification of any security breach, incident or vulnerability to OPG a description of the breach, incident or vulnerability, its potential security impact, its root cause, a remediation plan, and recommended mitigating or corrective actions; and (ii) promptly and continuously cooperate and coordinate with OPG to prevent, stop, contain, mitigate, resolve, recover from, respond to, and otherwise deal with any security breach, incident or vulnerability, including by providing OPG with ongoing status reports; (d) will: (i) ensure that no contaminants, including viruses, worms, Trojan horses, adware, spyware, trackware, hack tools, dialers, joke programs, time locks or other software routines, codes or instructions of a similar nature are placed on, or allowed access to, any OPG Systems and Information; and (ii) perform patching and testing on any Cyber Equipment, including through the performance of anti-malware and vulnerability sca...

Related to OPG Systems and Information

  • Generated Information means information produced in the performance of this CRADA.

  • Information has the meaning specified in Section 10.07.

  • Data Room Information means the information and documents listed in the index of documents contained in the Data Site attached to the Company Disclosure Letter;

  • Appendix Information means the information which must be provided for the selected modules as set out in the Appendix of the Approved EU SCCs (other than the Parties), and which for this Addendum is set out in:

  • Installation Information for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.

  • De-identified information means health information that