ABOUT NPCC Governance & Corporate Leadership Team Management Team Membership Careers Resources Contact Us PROGRAM AREAS Standards & Criteria Compliance RAPA SAIS COMMITTEES DER Forum Gov/Reg Affairs Reliability Coordinating Regional Standards NEWS Search SIGN IN

DDRM - Directory Development and Revision Manual

Current Status: Approved

Comment Period 08/25/2020 through 10/09/2020

08/25/2020

Comment Period Started

10/09/2020

Comment Period Ended

Activity

Comment Period 08/27/2019 through 10/11/2019

08/27/2019

Comment Period Started

10/11/2019

Comment Period Ended

Activity

Comment Period 01/04/2019 through 02/18/2019

01/04/2019

Comment Period Started

02/18/2019

Comment Period Ended

Activity

Comment Period 04/25/2018 through 06/09/2018

04/25/2018

Comment Period Started

06/09/2018

Comment Period Ended

Activity

Comment Period 06/24/2014 through 08/08/2014

06/24/2014

Comment Period Started

08/08/2014

Comment Period Ended

Activity

Comment Period 08/15/2013 through 09/29/2013

08/15/2013

Comment Period Started

09/29/2013

Comment Period Ended

Activity

Comment Period 04/12/2013 through 05/27/2013

04/12/2013

Comment Period Started

05/27/2013

Comment Period Ended

Activity

Comment Period 07/28/2011 through 09/12/2011

07/28/2011

Comment Period Started

09/12/2011

Comment Period Ended

  Upcoming Events


  News Highlights


NERC Issues Section 1600 Data Request for Internal Network Security Monitoring

May 25, 2023

GridSecCon 2023 Call for Abstracts – Deadline March 31

March 01, 2023

Security Notice

This is a Northeast Power Coordinating Council, Inc. (NPCC) information system. You have no reasonable expectation of privacy regarding communications or data transiting or stored on NPCC’s information system. At any time and for any lawful purpose, NPCC may monitor, intercept, record, and search any communications or data transiting or stored on this information system. At NPCC’s sole discretion, NPCC may disclose pertinent information to the U.S. Government and its authorized representatives to protect the security of critical infrastructure and key resources, ensure information security, or to comply with any applicable law, regulation, legal process, or enforceable governmental request. By continuing, you acknowledge that you understand and consent to the terms and conditions described in this notice. The actual or attempted unauthorized access, use, or modification of this system is strictly prohibited and may subject violators to criminal, civil, and/or administrative action.