Energy Credit Best Practices – Chapter: Information Technology http://ccro.org © Copyright 2022, CCRO. All rights reserved. 35 Independent Service Operator (ISO) - An independent, federally regulated entity established to coordinate regional transmission in a non-discriminatory manner and ensure the safety and reliability of the electric System. Information Lifecycle Management (ILM) -Is an approach to data and storage management that recognizes that the value of information changes over time and that it must be managed accordingly. ILM seeks to classify data according to its business value and establish policies to migrate and store data on the appropriate storage tier and, ultimately, remove it altogether. ILM has evolved to include upfront initiatives like master data management and compliance. (Gartner IT Glossary) Information Security - The protection of information and Systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide confidentiality, Integrity, and availability. Information Security Architecture - An embedded, integral part of the enterprise architecture that describes the structure and behavior of the enterprise security processes, security Systems, personnel, and organizational subunits, showing their alignment with the enterprise’s mission and strategic plans. See Security Architecture. Information Security Risk - The risk to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or Systems. Information System - A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Information Technology (IT) - Any services, equipment, or interconnected System (s) or subsystem (s) of equipment, that are used in the automatic acquisition, storage, analysis, evaluation, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the agency. For purposes of this definition, such services or equipment if used by the agency directly or is used by a contractor under a contract with the agency that requires its use or to a significant extent, its use in the performance of a service or the furnishing of a product. Information Technology includes computers, ancillary equipment (including imaging peripherals, input, output, and storage devices necessary for security and surveillance), peripheral equipment designed to be controlled by the central processing unit of a computer, software, firmware and similar procedures, services (including cloud computing and help-desk services or other professional services which support any point of the life cycle of the equipment or service), and related resources. Information Technology does not include any equipment that is acquired by a contractor incidental to a contract which does not require its use. Integrity - Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. Investment Bank - Investment banking is a specific division of banking related to the creation of capital for other companies, governments, and other entities. IT Architecture - A framework and set of guidelines to build new System s. IT architecture is a series of principles, guidelines or rules used by an enterprise to direct the process of acquiring, building, modifying, and interfacing IT resources throughout the enterprise. These resources can
Purchased by unknown, nofirst nolast From: CCRO Library (library.ccro.org)