This browser is not supported.
All Bulk Power System (BPS) owners, operators, and users are required to register with NERC and are subject to compliance with approved NERC Reliability Standards and NPCC Regional Reliability Standards. The process for registration is described in Section 500 and Appendix 5A of the NERC Rules of Procedure.
The NERC Statement of Compliance Registry Criteria, detailed in Appendix 5B of the NERC Rules of Procedure, describes the criteria employed by NERC, NPCC, and the other Regional Entities to determine the organizations to be registered as owners, operators, or users of the BPS and included on the NERC Compliance Registry (NCR). Additional NERC Registration information is available on NERC’s Organization Registration and Organization Certification webpage.
A Registered Entity is obligated to notify NPCC upon adding/deleting/transferring equipment, the sale of assets (see the Generator Database Form), changes in ownership or similar matters so that NPCC may review the effect on the Registered Entity’s compliance obligations.
Please contact NPCC via email with all questions regarding registration.
A Certification is required for new Balancing Authorities (BAs), Reliability Coordinators (RCs) and/or Transmission Operators (TOPs) prior to acting in these capacities.
A Certification Review for previously certified entities may be triggered by the following:
Please contact NPCC via email with questions regarding certification or if your entity meets the criteria for a Certification or Certification Review.
This is a Northeast Power Coordinating Council, Inc. (NPCC) information system. You have no reasonable expectation of privacy regarding communications or data transiting or stored on NPCC’s information system. At any time and for any lawful purpose, NPCC may monitor, intercept, record, and search any communications or data transiting or stored on this information system. At NPCC’s sole discretion, NPCC may disclose pertinent information to the U.S. Government and its authorized representatives to protect the security of critical infrastructure and key resources, ensure information security, or to comply with any applicable law, regulation, legal process, or enforceable governmental request. By continuing, you acknowledge that you understand and consent to the terms and conditions described in this notice. The actual or attempted unauthorized access, use, or modification of this system is strictly prohibited and may subject violators to criminal, civil, and/or administrative action.