We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Security Training Sample Clauses

Security Training a. In accordance with Section 2054.5192 of the Texas Government Code, each Engineer Personnel that will access a TxDOT computer system or database must complete a TxDOT approved cybersecurity training program that is certified under Section 2054.5192 of the Texas Government Code. The training program must be completed by each Engineer Personnel during the term of the contract and during any renewal period. Engineer shall provide verification of completion of the cybersecurity training program in a method designated by State. b. In this section 3, “Engineer Personnel” includes officers and employees of both Engineer and its subcontractors.
Security Training. Staff will be required to attend a security induction course. The cost of this will be met by the Authority at the rates applicable for the purposes of the Contract.
Security Training. A. Microsoft informs its personnel about relevant security procedures and their respective roles. Microsoft also informs its personnel of possible consequences of breaching the security rules and procedures. B. Microsoft will only use anonymous data in training.
Security TrainingThe Contractor shall ensure all Contractor and subContractor employees who require access to or who perform services on a Government installation are aware of and have conducted the appropriate Government security training as summarized below. Training requirements are subject to change as conditions, policies, or regulations change, and may vary between units, due to the type, focus, or environment. Access to on- line training is usually from a Government account (on-post computer and/or CAC-enabled access), but some may be conducted from other source(s). The table below summarizes relevant Government security-related training: Anti-terrorism (AT) Level I All (performance in an Army controlled installation, facility, or area) At start of contract performance and annually thereafter Access and General Protection/Security Policy and Procedures All (performance in an Army controlled installation, facility, or area) At start of contract performance and when conditions change AT Awareness Training CONUS/OCONUS travel 30 days or less prior to CONUS/OCONUS travel Access to Government Information Systems All who are given access to a Government computer/e-mail account At start of contract performance and annually thereafter OPSEC Training All (performance in an Army controlled installation, facility, or area) At start of contract performance and annually thereafter Information Assurance ((IA)/Information Technology (IT) training All who are given access to Government computers or an e-mail account At start of contract performance and annually thereafter Information Assurance ((IA)/Information Technology (IT) certification) Any elevated-level access (e.g. IMO- type work, knowledge management, SharePoint, web design) Upon contract award or start of contract performance Security briefing FAR 52.204-2. Contractors requiring handling of/access to Classified Prior to access AT/OPSEC – deployed* DFARS Clause 252.225-7040. Contractors authorized to accompany the Force (contingency operations, humanitarian, peacekeeping) Prior to deployment AT – theater specific clearance* DFARS Clause 252.225-7043. Performance or Delivery in a foreign country (contingency and non- contingency support) Prior to deployment * These training requirements only apply to performance governed by the specified DFARS clauses. Performance in those areas governed by those DFARS Clauses is expected to occur infrequently for this MAIDIQ, but is included in the interest of full disclosure.
Security Training. Jamf will provide appropriate security awareness, education, and training to all Jamf personnel and contractors with access to the Software and Services provided to Customer.
Security Training i. All personnel participating in the Root Zone Signing process shall have adequate IT security training. ii. Supplemental guidance on establishing a security awareness training program may be found in NIST SP 800-50.
Security Training a. Acuity informs its personnel about relevant security procedures and their respective roles. Acuity also informs its personnel of possible consequences of breaching the security rules and procedures.
Security Training. Microsoft informs its personnel about relevant security procedures and their respective roles. Microsoft also informs its personnel of possible consequences of breaching the security rules and procedures. Microsoft will use only anonymous data in training. Microsoft has implemented and will maintain for Customer Data in the Core Online Services the following security measures, which, in conjunction with the security commitments in the OST (including the GDPR Terms), are Microsoft’s only responsibility with respect to the security of that data. Domain Practices Organization of Information Security Security Ownership. Microsoft has appointed one or more security officers responsible for coordinating and monitoring the security rules and procedures. Security Roles and Responsibilities. Microsoft personnel with access to Customer Data are subject to confidentiality obligations. Risk Management Program. Microsoft performed a risk assessment before processing the Customer Data or launching the Online Services service. Microsoft retains its security documents pursuant to its retention requirements after they are no longer in effect. Asset Management Asset Inventory. Microsoft maintains an inventory of all media on which Customer Data is stored. Access to the inventories of such media is restricted to Microsoft personnel authorized in writing to have such access. Asset Handling - Microsoft classifies Customer Data to help identify it and to allow for access to it to be appropriately restricted. - Microsoft imposes restrictions on printing Customer Data and has procedures for disposing of printed materials that contain Customer Data. - Microsoft personnel must obtain Microsoft authorization prior to storing Customer Data on portable devices, remotely accessing Customer Data, or processing Customer Data outside Microsoft’s facilities. Human Resources Security Security Training. Microsoft informs its personnel about relevant security procedures and their respective roles. Microsoft also informs its personnel of possible consequences of breaching the security rules and procedures. Microsoft will use only anonymous data in training. Physical and Environmental Security Physical Access to Facilities. Microsoft limits access to facilities where information systems that process Customer Data are located to identified authorized individuals. Physical Access to Components. Microsoft maintains records of the incoming and outgoing media containing Customer Data, including the ...
Security Training. All employees will be required to take such security training as may be determined and required by the Department of Corrections and the Bureau of Correction Education. Except for emergency situations, permanent full-time employees in this bargaining unit will not be required to work independently with inmates until the employee has completed the pre-service training requirements referenced in the Department of Corrections Policy 5.2.1, Minimum Training criteria.
Security Training. Flipgrid informs its personnel about relevant security procedures and their respective roles. Flipgrid also informs its personnel of possible consequences of breaching the security rules and procedures.