Cybersecurity Training definition

Cybersecurity Training. In the event that Vendor’s employees, officers, and subcontractors will have access to Customer’s computer system and/or database, Vendor’s employees, offices, and subcontractors must complete a cybersecurity training program certified under Section 2054.519, Texas Government Code and selected by Customer. The cybersecurity training program must be completed by Vendor’s employees, officers, and subcontractors during the term of the Agreement and any renewal period. Vendor shall verify completion of the program in writing to Customer within the first thirty (30) calendar days of the term of the Agreement and any renewal period. Vendor acknowledges and agrees that its failure to comply with the requirements of this Section are grounds for Customer to terminate the Agreement for cause with immediate effect. Audit Logging:

Examples of Cybersecurity Training in a sentence

  • If applicable to this Contract, and as directed by DFPS, the Grantee will comply with Texas Government Code Section §2054.5192 and complete this Section’s Cybersecurity Training requirements.

  • All of Contractor’s authorized users, workforce and subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State Contractors, by the Texas Department of Information Resources.

  • All of Subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State MA Dual SNPs, by the Texas Department of Information Resources.

  • If applicable to this Contract, and as directed by DFPS, the Contractor will comply with Texas Government Code Section §2054.5192 and complete this Section’s Cybersecurity Training requirements.

  • All of the MA Health Plan Subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State MA Health Plans, by the Texas Department of Information Resources.

  • Subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State MA Dual SNPs, by the Texas Department of Information Resources.

  • Cybersecurity Training RequirementLocal units of governments must comply with the Cybersecurity Training requirements described in Section 772.012 and Section 2054.5191 of the Texas Government Code.

  • Government entities must annually certify their compliance with the training requirements using the Cybersecurity Training Certification for State and Local Governments.

  • All of the MA Dual SNP’s authorized users, workforce and Subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State MA Dual SNPs, by the Texas Department of Information Resources.

  • All of CLINIC’s authorized users, workforce and subcontractors with access to a state computer system or database will complete a cybersecurity training program certified under Texas Government Code, Title 10, Subtitle B, Chapter 2054, Section 2054.5192, Cybersecurity Training Required: Certain State Contractors, by the Texas Department of Information Resources.

Related to Cybersecurity Training

  • Travel training means providing instruction, as appropriate, to children with significant cognitive disabilities, and any other children with disabilities who require this instruction, to enable them to:

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • NSS means the new safekeeping structure which applies to Registered Notes held in global form by a Common Safekeeper for Euroclear and Clearstream, Luxembourg and which is required for such Registered Notes to be recognised as eligible collateral for Eurosystem monetary policy and intra-day credit operations;

  • WorkSafeBC means the Workers Compensation Board, a provincial Crown corporation created pursuant to the Workers Compensation Act (British Columbia);

  • Skills training means systematic skill building through curriculum-based psychoeducational and cognitive-behavioral interventions. These interventions break down complex objectives for role performance into simpler components, including basic cognitive skills such as attention, to facilitate learning and competency.

  • NOC means National Olympic Committee.

  • T&Cs means these Terms and Conditions.

  • Cyberbullying means any form of communication by electronic act that is sent with the purpose to:

  • CENVAT means Central Value Added Tax

  • Cybersecurity means the measures taken to protect a computer, computer network, or computer system against unauthorized use or access.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • We/Our/Us means the Underwriters named in the Schedule.

  • Urgent Works means any urgent measures, which in the opinion of the Engineer-in-charge become necessary during the progress of the work to obviate any risk of accident or failure or which become necessary for security.

  • Security Services means, a systemic approach to managing an organisation’s security needs as per specifications, terms and conditions stipulated under the contract, the organisation in this case refers to Medical Colleges/ Hospitals

  • Technical safeguards means the technology and the policy and procedures for its use that 27 protect electronic PHI and control access to it.

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Secure Network means a network which is only accessible by Secure

  • biodiversity means the variability among living organisms from all sources including, inter alia, terrestrial, marine and other aquatic ecosystems and the ecological complexes of which they are part; this includes diversity within species, between species and of ecosystems;

  • Accenture means the Accenture entity that is a party to the Agreement and its Affiliates (collectively, “Accenture”).

  • Radiologic technologist means an individual, other than a licensed doctor of medicine, osteopathy,

  • Network User means a customer or a potential customer of a transmission system operator, and transmission system operators themselves in so far as it is necessary for them to carry out their functions in relation to transmission;

  • Firefighter means any regular, paid or volunteer, member of a lawfully constituted fire department of a municipal corporation, township, fire district, or village.

  • Cultural means relating to the habits, practices, beliefs, and traditions of a certain group of people.

  • Technological safeguards means the technology and the policy and procedures for use of the technology to protect and control access to personal information.

  • RIS means a regulated information service for the purposes of giving information relating to the ETP Securities and/or the rules of the Relevant Stock Exchange chosen by the Issuer from time to time, including but not limited to the Regulatory News Service (the "RNS") of the London Stock Exchange.

  • Camera means a device that renders an image of the outside world and then converts this image into a signal (e.g. video signal).