ABOUT NPCC PROGRAM AREAS COMMITTEES LIBRARY SIGN IN
 

Events Analysis

Through participation in the ERO Event Analysis Program, NERC, Regions and the industry analyze events, identify the lessons to be learned, and conduct a formal cause code analysis.  NERC has established an enhanced, industry wide Event Analysis Process (EAP) based on the recognition that many events, which occur on the bulk power system,  can have varying levels of significance to the electric system and provide otherwise unrealized lessons to be learned and an opportunity for the trending of such events to identify possible reliability concerns.

The adoption by NERC of the Event Analysis Program brings clarity and certainty about what system events are relevant to analyze and to what level of detail, targeting potential risks to the reliability of the bulk power system for a more detailed and in-depth analysis.

NPCC staff works step-by-step with the registered entity throughout the total event analysis process, permitting the entity to assume the primary role in the development of the initial event analysis, lessons learned, which may benefit the industry, along with assisting and overseeing the standards sufficiency review and cause coding process for trending and reporting. NPCC staff, throughout the process, guides, supports and stands as an advocate of the registered entity as they continue to develop an improved culture of reliability and compliance.

Latest News

No news were found.

Latest Documents

Documents

Security Notice

This is a Northeast Power Coordinating Council, Inc. (NPCC) information system. You have no reasonable expectation of privacy regarding communications or data transiting or stored on NPCC’s information system. At any time and for any lawful purpose, NPCC may monitor, intercept, record, and search any communications or data transiting or stored on this information system. At NPCC’s sole discretion, NPCC may disclose pertinent information to the U.S. Government and its authorized representatives to protect the security of critical infrastructure and key resources, ensure information security, or to comply with any applicable law, regulation, legal process, or enforceable governmental request. By continuing, you acknowledge that you understand and consent to the terms and conditions described in this notice. The actual or attempted unauthorized access, use, or modification of this system is strictly prohibited and may subject violators to criminal, civil, and/or administrative action.