ABOUT NPCC Careers Contact Us Governance & Corporate Membership Resources Leadership Team PROGRAM AREAS Standards & Criteria Compliance RAPA SAIS COMMITTEES DER Forum Gov/Reg Affairs Reliability Coordinating Regional Standards NEWS Search SIGN IN

Retired

The ‘C’ Procedure documents listed below have been retired and the document content has been incorporated in a Directory Appendix or other NPCC document as indicated.

Documents

C-00

13.1 KB

09/09/2014

C-03

71.0 KB

09/09/2014

C-04

14.9 KB

09/09/2014

C-05

13.6 KB

09/09/2014

C-07

13.3 KB

09/09/2014

C-08

14.8 KB

09/09/2014

C-09

15.0 KB

09/09/2014

C-10

3.8 KB

09/09/2014

C-11

14.9 KB

09/09/2014

C-12

15.3 KB

09/09/2014

C-13

13.8 KB

09/09/2014

C-14

3.8 KB

09/09/2014

C-16

13.0 KB

09/09/2014

C-17

34.7 KB

09/09/2014

C-18

25.8 KB

09/09/2014

C-20

15.3 KB

09/09/2014

C-21

12.9 KB

09/09/2014

C-22

14.7 KB

09/09/2014

C-25

67.3 KB

06/04/2019

C-29

38.1 KB

01/25/2017

C-30

39.5 KB

07/27/2016

C-32

13.1 KB

09/09/2014

C-33

67.0 KB

11/07/2019

C-35

31.1 KB

09/09/2014

C-36

14.5 KB

09/09/2014

C-37

13.3 KB

09/09/2014

C-38

13.5 KB

09/09/2014

C-39

39.6 KB

07/27/2016

C-40

24.8 KB

09/09/2014

C-42

25.0 KB

09/09/2014

C-44

18.9 KB

09/09/2014

  Upcoming Events


  News Highlights


GridSecCon 2023 Registration is Open

June 12, 2023

NERC Issues Section 1600 Data Request for Internal Network Security Monitoring

May 25, 2023

Security Notice

This is a Northeast Power Coordinating Council, Inc. (NPCC) information system. You have no reasonable expectation of privacy regarding communications or data transiting or stored on NPCC’s information system. At any time and for any lawful purpose, NPCC may monitor, intercept, record, and search any communications or data transiting or stored on this information system. At NPCC’s sole discretion, NPCC may disclose pertinent information to the U.S. Government and its authorized representatives to protect the security of critical infrastructure and key resources, ensure information security, or to comply with any applicable law, regulation, legal process, or enforceable governmental request. By continuing, you acknowledge that you understand and consent to the terms and conditions described in this notice. The actual or attempted unauthorized access, use, or modification of this system is strictly prohibited and may subject violators to criminal, civil, and/or administrative action.