Contingencies and Interfaces

LEW HANES: How are these contingencies handled?

BILL MELTON: The Security Coordinators will evaluate the system interfaces using the first contingencies associated with the interfaces. He/she will then inform all parties involved as to how the case is solved if a problem should actually exist.

If the Security Coordinator runs a study case using the first contingency and  cannot solve the case by loading our resources, that's when we get into the process of trying to bring that interface down to a controllable leveLew Hanes:  It's more complicated than that, but that's the basis of what happens if the Security Coordinator identifies a potential problem on our system.

They have developed plans and procedures for each individual interface.  They know what to do to fix an interface if there's a problem.

LEW HANES: Where are those procedures stored?

BILL MELTON: They are in a book that can be accessed easily.