Cybersecurity Requirements definition

Cybersecurity Requirements means all applicable laws, regulations, codes, guidance (from regulatory and advisory bodies, whether mandatory or not), the Data Security and Protection Toolkit, international and national standards, and sanctions relating to security of network and information systems and security breach and incident reporting requirements, including Data Protection Legislation, the NIS Regulations, and to the extent they remain applicable in the UK the Cybersecurity Directive (EU) 2016/1148), Commission Implementing Regulation (EU) 2018/151), all as amended or updated from time to time;
Cybersecurity Requirements means all Applicable Laws relating to security of network and information systems and security breach and incident reporting requirements including Data Protection Law;
Cybersecurity Requirements means the Combined Authority’s cybersecurity requirements as set out in Schedule 10 (Cybersecurity Requirements);

Examples of Cybersecurity Requirements in a sentence

  • The Registrar shall not be liable to the Fund Company for any loss, expense or consequence arising out of the services to be performed by it under the Registrar Agreement unless the foregoing arises by virtue of any fraud, wilful default, bad faith or negligence on the part of the Registrar and in no circumstance shall the Registrar be liable for indirect or consequential loss.

  • The Supplier warrants that it has the necessary Cybersecurity protocol pursuant to CPR’s Cybersecurity Requirements document at the time of execution of this contract and thereafter for the remainder of the Term.

  • Supplier and its Representatives shall comply with the (i) Siemens Cybersecurity Requirements (“Cybersecurity Requirements”) set forth in Exhibit C and (ii) Siemens Data Privacy Requirements (“Data Privacy Requirements”) set forth in Exhibit D in the event Supplier handles Personal Information (as defined in Exhibit D) of Customer and/or its parent, subsidiaries, affiliates, customers or Representatives in connection with this Purchase Order.

  • Heightened Cybersecurity Requirements: any laws, regulations, codes, guidance (from regulatory and advisory bodies.

  • B), and applicable state privacy and cybersecurity laws and regulations, including, but not limited to, California Consumer Privacy Act (to the extent applicable), 11 NYCRR 421-Insurance Regulation No. 173, NYDFS Cybersecurity Requirements For Financial Services Companies, 23 NYCRR 500 et.

  • Supplier’s failure to comply with and/or remediate any such noncompliance with the Cybersecurity Requirements and/or Data Privacy Requirements shall be a material breach of the Purchase Order and, in addition to other remedies, Customer shall be permitted to immediately terminate the Purchase Order without penalty.

  • Supplier and its Representatives shall comply with the (i) Siemens Energy Cybersecurity Requirements (“Cybersecurity Requirements”) set forth in Exhibit C and (ii) Siemens Energy Data Privacy Requirements for Personal Information (“Data Privacy Requirements”) set forth in Exhibit D in the event Supplier handles Personal Information (as defined in Exhibit D) of Customer and/or its parent, subsidiaries, Affiliates, Customer’s end user or Representatives in connection with the Purchase Order.

  • If Services or Goods provided by Supplier will connect to any network or individual electronic device of ESI or its affiliates, upgradable software is used in conjunction with the acquisition of Services or Goods provided by Supplier, or Supplier is in possession of, managing, accessing, or hosting any data of ESI or its affiliates, then Supplier is required to comply with the Cybersecurity Requirements set forth at the following link: Cybersecurity Requirements.

  • Aline Doussin, New EU Cybersecurity Requirements Soon to Fall on “Essential Services” Operators, SQUIRE PATTON BOGGS: GLOBAL IP & PRIVACY L.

  • Contractor will comply with the Citywide Cybersecurity Requirements for Vendors and Contractors set forth by the New York City Office of Technology and Innovation and its Office of Cyber Command as they appear at xxxxx://xxx.xxx/infosec.


More Definitions of Cybersecurity Requirements

Cybersecurity Requirements means all applicable Laws, regulations, codes, guidance (from regulatory and advisory bodies), international and national standards, and sanctions relating to security of network and information systems and security breach and incident reporting requirements, including the Data Protection Legislation, the Cybersecurity Directive ((EU) 2016/1148), Commission Implementing Regulation ((EU) 2018/151), the Network and Information Systems Regulations 2018 (SI 506/2018), all as amended or updated from time to time, but in each case only to the extent legally binding;
Cybersecurity Requirements. The contractor shall follow Unified Facility Criteria (UFC) 4- 010-06 and Unified Facility Guide Specification (UFGS) 25 05 11, Cybersecurity of Facility- Related Control Systems. UFC 4-010-06 defines the five steps to integrate cybersecurity into the FRCS Design as follows (see UFC 4-010-06 Chapter 3-1.1 Five Steps for Cybersecurity Design): a) Step 1: Based on the organizational mission and details of the control system, the System Owner (SO) and Authorizing Official (AO) determine the Confidentiality, Integrity, and Availability (CIA) impact levels (Low, Moderate, or High) for the control system. The CIA rating for the associated FRCS in this project is: [Designer / Project Engineer note: CIA rating must be obtained from stakeholder] Confidentiality: X (L,M, H) , Integrity: X (L,M,H), Availability: X (L,M,H) b) Step 2: Use the impact levels to select the proper list of controls from NIST SP 800-82. (SEE NOTE BELOW) c) Step 3: Using the DoD master Control Correlation Identifier (CCI) list, create a list of relevant CCIs based on the controls selected in Step 2. (SEE NOTE BELOW) d) Step 4: Categorize CCIs and identify CCIs that require input from the designer or are the designer’s responsibility. (SEE NOTE BELOW) e) Step 5: Include cybersecurity requirements in the project specifications using the UFGS 25 05 11 and provide input to other specifications as required. NOTE: Refer to Appendix H in the UFC which contains tables covering steps 2-4 as listed above. The contractor shall address the CCIs listed for the DESIGNER. The contractor shall provide design specifications to cover the requirement or provide input to others regarding the implementation or lack of feasibility of the CCI relating to the control system components installed, (workstations, servers, building point of connections, network switches, routers and other IP enabled devices…). The DESIGNER controls will have an impact level of LOW or MODERATE. For LOW, LOW, LOW systems, address all DESIGNER controls listed as LOW. If the SO and AO determine the system is designated as MODERATE, the contractor shall address DESIGNER controls listed as LOW and MODERATE.

Related to Cybersecurity Requirements

  • Security Requirements means the requirements regarding the security of Personal Data, as set out in the Data Protection Laws (including, in particular, the seventh data protection principle of the DPA and/ or the measures set out in Article 32(1) of the GDPR (taking due account of the matters described in Article 32(2) of the GDPR)) as applicable;

  • Security Requirement means the amount in Dollars (as certified by the Agent whose certificate shall, in the absence of manifest error, be conclusive and binding on the Borrowers and the Creditors) which is, at any relevant time:

  • Data Security Requirements means, collectively, all of the following to the extent relating to Data Treatment, to any privacy, security, or security breach notification requirements applicable to the Company or any Retained Subsidiary, to the conduct of the Management and Franchise Business, or to any System: (i) PCI-DSS, (ii) the Company’s and the Retained Subsidiaries’ own rules and policies and (iii) applicable Law.

  • Privacy and Security Requirements means (a) all Privacy Laws; (b) all applicable Privacy Contracts, and (c) all applicable Privacy Policies.

  • Privacy Requirements means all applicable Privacy Laws and all of the Company’s and the Company Subsidiaries’ policies, notices, and contractual obligations relating to the Processing of Personal Information.

  • Safety Requirements means Prudent Electrical Practices, CPUC General Order No. 167, Contractor Safety Program Requirements, and all applicable requirements of Law, PG&E, the Utility Distribution Company, the Transmission Provider, Governmental Approvals, the CAISO, CARB, NERC and WECC.

  • Authority Requirements means the operational requirements, functions and characteristics of the Framework set out in Schedule 1 (Statement of Requirements)

  • Mandatory City Requirements means those City laws set forth in the San Francisco Municipal Code, including the duly authorized rules, regulations, and guidelines implementing such laws that impose specific duties and obligations upon Contractor.

  • OHS Requirements means all Laws applicable to the Supply and related to occupational health or safety, and all of the City Policies that relate to occupational health or safety, and includes without limitation the WCA;

  • Federal safety requirements means applicable provisions of 49 U.S.C. § 30101 et seq. and all

  • Cybersecurity means the measures taken to protect a computer, computer network, or computer system against unauthorized use or access.

  • Resource Adequacy Requirements has the meaning set forth in Section 3.3.

  • Environmental and Safety Requirements means all federal, state, local and foreign statutes, regulations, ordinances and similar provisions having the force or effect of law, all judicial and administrative orders and determinations, all contractual obligations and all common law concerning public health and safety, worker health and safety and pollution or protection of the environment, including all such standards of conduct and bases of obligations relating to the presence, use, production, generation, handling, transport, treatment, storage, disposal, distribution, labeling, testing, processing, discharge, release, threatened release, control, or cleanup of any hazardous materials, substances or wastes, chemical substances or mixtures, pesticides, pollutants, contaminants, toxic chemicals, petroleum products or by-products, asbestos, polychlorinated biphenyls (or PCBs), noise or radiation.

  • Data Protection Requirements means all applicable (i) Data Protection Laws, (ii) Privacy Policies and (iii) those terms of any Contracts imposing obligations on the Company or its Subsidiaries with respect to the Company’s collection, use, storage, disclosure, or cross-border transfer of Personal Data.

  • Environmental, Health, and Safety Requirements means all federal, state, local and foreign statutes, regulations, and ordinances concerning public health and safety, worker health and safety, and pollution or protection of the environment, including without limitation all those relating to the presence, use, production, generation, handling, transportation, treatment, storage, disposal, distribution, labeling, testing, processing, discharge, release, threatened release, control, or cleanup of any hazardous materials, substances or wastes, as such requirements are enacted and in effect on or prior to the Closing Date.

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • MREL Requirements means the laws, regulations, requirements, guidelines, rules, standards and policies relating to minimum requirements for own funds and eligible liabilities applicable to the Issuer and/or the Group, from time to time, (including any applicable transitional or grandfathering provisions), including, without limitation to the generality of the foregoing, any delegated or implementing acts (such as regulatory technical standards) adopted by the European Commission and any regulations, requirements, guidelines, rules, standards and policies relating to minimum requirements for own funds and eligible liabilities adopted by the Federal Republic of Germany or the Republic of Italy, a relevant resolution authority or the European Banking Authority from time to time (whether or not such requirements, guidelines or policies are applied generally or specifically to the Issuer and/or the Group), as any of the preceding laws, regulations, requirements, guidelines, rules, standards, policies or interpretations may be amended, supplemented, superseded or replaced from time to time.

  • PJM Region Reliability Requirement means, for purposes of the Base Residual Auction, the Forecast Pool Requirement multiplied by the Preliminary PJM Region Peak Load Forecast, less the sum of all Preliminary Unforced Capacity Obligations of FRR Entities in the PJM Region; and, for purposes of the Incremental Auctions, the Forecast Pool Requirement multiplied by the updated PJM Region Peak Load Forecast, less the sum of all updated Unforced Capacity Obligations of FRR Entities in the PJM Region.

  • Technical Requirements means the Technical Requirements in Section VII of the tendering documents.

  • Statement of Requirements means a statement issued by the Authority or any Other Contracting Body detailing its Services Requirement issued in accordance with the Ordering Procedure;

  • Eligibility Requirements means, with respect to any Person, that such Person has at least $200,000,000 in capital/statutory surplus or shareholders’ equity (except with respect to a pension advisory firm or similar fiduciary) and at least $600,000,000 in total assets (in name or under management), and is regularly engaged in the business of making or owning commercial real estate loans (or interests therein), mezzanine loans (or interests therein) or commercial loans (or interests therein) similar to the Mortgage Loan.

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • Accessibility Standards means accessibility standards and specifications for Texas agency and institution of higher education websites and EIR set forth in 1 TAC Chapter 206 and/or Chapter 213.

  • Storage Injection Requirements means all volumes required by the Seller for injection into underground storage, including cushion gas, and for liquification, including fuel used for injection and in liquification plants, or for such other storage projects that may be developed expressly for the protection of supply to high priority users.

  • Security Regulations has the meaning set forth in Section 8.2(a).

  • Program Requirements means certain minimum program entry requirements as well as ongoing program requirements, to be fulfilled by Partner, some of which are general PartnerEdge requirements, some of which are specific for the “Sell Engagement” and some of which are specific for the different “Cloud” Product Families, including, without limitation payment of the Program Fee(s), meeting certain minimum annual revenue requirements, upholding a Sell Authorization for at least one “Cloud” Product Family and other requirements as set out in detail in the PartnerEdge Program Guide and the RSPI.