Cybersecurity Training definition

Cybersecurity Training. In the event that Vendor’s employees, officers, and subcontractors will have access to Customer’s computer system and/or database, Vendor’s employees, offices, and subcontractors must complete a cybersecurity training program certified under Section 2054.519, Texas Government Code and selected by Customer. The cybersecurity training program must be completed by Vendor’s employees, officers, and subcontractors during the term of the Agreement and any renewal period. Vendor shall verify completion of the program in writing to Customer within the first thirty (30) calendar days of the term of the Agreement and any renewal period. Vendor acknowledges and agrees that its failure to comply with the requirements of this Section are grounds for Customer to terminate the Agreement for cause with immediate effect. Audit Logging:

Examples of Cybersecurity Training in a sentence

  • All of Contractor’s authorized users, workforce and subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State Contractors, by the Texas Department of Information Resources.

  • All of Subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State MA Dual SNPs, by the Texas Department of Information Resources.

  • Cybersecurity Training In accordance with La. R.S. 42:1267(B)(3) and the State of Louisiana’s Information Security Policy, if the Contractor, any of its employees, agents, or subcontractors will have access to State government information technology assets, the Contractor’s employees, agents, or subcontractors with such access must complete cybersecurity training annually, and the Contractor must present evidence of such compliance annually and upon request.

  • All of the MA Health Plan Subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State MA Health Plans, by the Texas Department of Information Resources.

  • Cybersecurity Training Certification: In accordance with Section 2054.5192, Texas Government Code, if Contracting Party, or a subcontractor, officer, or employee of Contracting Party, will have access to a state computer system or database, then Contracting Party shall ensure that such officer, employee, or subcontractor shall complete a cybersecurity training program certified under Section 2054.519, Texas Government Code, as selected by University.

  • For more information, see the Texas Department of Information Resources’ website on this requirement: xxxxx://xxx.xxxxx.xxx/View-About-DIR/Information-Security/Pages/Content.aspx?id=154] Cybersecurity Training Program.

  • All of the MA Dual SNP’s authorized users, workforce and Subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State MA Dual SNPs, by the Texas Department of Information Resources.

  • Cybersecurity Training Certification: In accordance with Section 2054.5192, Texas Government Code, if Contractor, or a subcontractor, officer, or employee of Contractor, will have access to a state computer system or database, then Contractor shall ensure that such officer, employee, or subcontractor shall complete a cybersecurity training program certified under Section2054.519, Texas Government Code, as selected by University.

  • Cybersecurity Training and Awareness • Develop a comprehensive project plan to design, develop, implement, and maintain a role-based cybersecurity training and awareness capability as part of the District’s Information Security Management Program.

  • All of CLINIC’s authorized users, workforce and subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State Contractors, by the Texas Department of Information Resources.

Related to Cybersecurity Training

  • Travel training means providing instruction, as appropriate, to children with significant cognitive disabilities, and any other children with disabilities who require this instruction, to enable them to:

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • NSS means the new safekeeping structure which applies to Registered Notes held in global form by a Common Safekeeper for Euroclear and Clearstream, Luxembourg and which is required for such Registered Notes to be recognised as eligible collateral for Eurosystem monetary policy and intra-day credit operations;

  • WorkSafeBC means the Workers Compensation Board, a provincial Crown corporation created pursuant to the Workers Compensation Act (British Columbia);

  • Skills training means systematic skill building through curriculum-based psychoeducational and cognitive-behavioral interventions. These interventions break down complex objectives for role performance into simpler components, including basic cognitive skills such as attention, to facilitate learning and competency.

  • NOC means Network and Support Operating Centre.

  • T&Cs means these terms and conditions.

  • Customer Specific Training means a private Course organized on demand specifically for Customer.

  • Cyberbullying means any form of communication by electronic act that is sent with the purpose to:

  • CENVAT means Central Value Added Tax

  • Cybersecurity means the measures taken to protect a computer, computer network, or computer system against unauthorized use or access.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Supplier Operations means all assets, processes and systems (including information systems), data (including Customer data), personnel, and sites, used or processed by Supplier from time to time in the performance of this Agreement.

  • Fabric refresher means a product labeled to neutralize or eliminate odors on nonlaundered fabric including, but not limited to, soft household surfaces, rugs, carpeting, draperies, bedding, automotive interiors, footwear, athletic equipment, clothing and/or on household furniture or objects upholstered or covered with fabrics such as, but not limited to, wool, cotton, or nylon. “Fabric Refresher” does not include “Anti-static Product,” “Carpet/Upholstery Cleaner,” “Footwear or Leather Care Product,” “Spot Remover,” or “Disinfectant,” or products labeled for application to both fabric and human skin.

  • Urgent Works means any urgent measures, which in the opinion of the Engineer-in-charge become necessary during the progress of the work to obviate any risk of accident or failure or which become necessary for security.

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Secure Network means a network which is only accessible by Secure Authentication.

  • biodiversity means the variability among living organisms from all sources including, inter alia, terrestrial, marine and other aquatic ecosystems and the ecological complexes of which they are part; this includes diversity within species, between species and of ecosystems;

  • Accenture means the Accenture entity that is a party to the Agreement and its Affiliates (collectively, “Accenture”).

  • Network User means each natural or legal person having concluded a Standard Transmission Agreement with the TSO for Transmission Services in the Transmission Grid.

  • Firefighter means any regular, paid or volunteer, member of a lawfully constituted fire department of a municipal corporation, township, fire district, or village.

  • Medical cannabis card means the same as that term is defined in Section 26-61a-102.

  • Technological safeguards means the technology and the policy and procedures for use of the technology to protect and control access to personal information.

  • RIS means a regulated information service for the purposes of giving information relating to the ETP Securities and/or the rules of the Relevant Stock Exchange chosen by the Issuer from time to time, including but not limited to the Regulatory News Service (the "RNS") of the London Stock Exchange.

  • Camera means a device that renders an image of the outside world and then converts this image into a signal (e.g. video signal).

  • FIRM PROCUREMENT means the agreement between the parties for mutually agreed terms and conditions with commitment of Quantity Ordered.