{"component": "clause", "props": {"groups": [{"size": 24, "snippet": "If Contractor and/or its subcontractors, officers, or employees will have an account on a state computer system (for example, an account to an application, database, or network), then pursuant to Section 2054.5192, Texas Government Code, Contractor and its subcontractors, officers, and employees must complete a cybersecurity training program certified under Section 2054.519, Texas Government Code and selected by the University. The cybersecurity training program must be completed by Contractor and its subcontractors, officers, and employees during the term and any renewal period of this Agreement. Contractor shall verify completion of the program to the University.", "samples": [{"hash": "2UZmTbyEoLf", "uri": "/contracts/2UZmTbyEoLf#cybersecurity-training-program", "label": "Contractor Agreement", "score": 33.4478263855, "published": true}, {"hash": "kBuPjBfyWhO", "uri": "/contracts/kBuPjBfyWhO#cybersecurity-training-program", "label": "Contractor Agreement", "score": 33.0615158081, "published": true}, {"hash": "1We3aHmYhXs", "uri": "/contracts/1We3aHmYhXs#cybersecurity-training-program", "label": "Contractor Agreement", "score": 32.7662200928, "published": true}], "snippet_links": [{"key": "contractor-and-or", "type": "clause", "offset": [3, 20]}, {"key": "employees-will", "type": "clause", "offset": [54, 68]}, {"key": "computer-system", "type": "definition", "offset": [96, 111]}, {"key": "for-example", "type": "clause", "offset": [113, 124]}, {"key": "pursuant-to-section", "type": "definition", "offset": [184, 203]}, {"key": "texas-government-code", "type": "clause", "offset": [215, 236]}, {"key": "contractor-and-its-subcontractors", "type": "clause", "offset": [238, 271]}, {"key": "employees-must", "type": "clause", "offset": [287, 301]}, {"key": "by-the-university", "type": "clause", "offset": [413, 430]}, {"key": "by-contractor", "type": "clause", "offset": [485, 498]}, {"key": "during-the-term", "type": "clause", "offset": [547, 562]}, {"key": "period-of-this-agreement", "type": "clause", "offset": [579, 603]}, {"key": "contractor-shall", "type": "clause", "offset": [605, 621]}, {"key": "completion-of-the-program", "type": "clause", "offset": [629, 654]}, {"key": "to-the-university", "type": "clause", "offset": [655, 672]}], "hash": "5082f4ec8c4d3d1ab7661f5e3f47faf7", "id": 1}, {"size": 19, "snippet": "During the term and any renewal of this Agreement, each party shall comply with Texas Government Code Chapter 2054 concerning cybersecurity for state agencies and local government, and to the extent applicable verify compliance to the other party.", "samples": [{"hash": "fPDzVwYqPBQ", "uri": "/contracts/fPDzVwYqPBQ#cybersecurity-training-program", "label": "Interlocal Agreement", "score": 34.5523605347, "published": true}, {"hash": "6dUITN4Ukaa", "uri": "/contracts/6dUITN4Ukaa#cybersecurity-training-program", "label": "Interlocal Agreement", "score": 34.4524481495, "published": true}, {"hash": "kfG17DPBv8U", "uri": "/contracts/kfG17DPBv8U#cybersecurity-training-program", "label": "Interlocal Agreement", "score": 34.4031755071, "published": true}], "snippet_links": [{"key": "during-the-term", "type": "clause", "offset": [0, 15]}, {"key": "renewal-of-this-agreement", "type": "clause", "offset": [24, 49]}, {"key": "each-party", "type": "clause", "offset": [51, 61]}, {"key": "comply-with", "type": "clause", "offset": [68, 79]}, {"key": "texas-government-code", "type": "clause", "offset": [80, 101]}, {"key": "for-state-agencies", "type": "clause", "offset": [140, 158]}, {"key": "local-government", "type": "clause", "offset": [163, 179]}, {"key": "to-the-extent", "type": "clause", "offset": [185, 198]}, {"key": "verify-compliance", "type": "clause", "offset": [210, 227]}, {"key": "other-party", "type": "clause", "offset": [235, 246]}], "hash": "868ed432fc6771687e8f6a17c9a4f50f", "id": 2}, {"size": 14, "snippet": "Pursuant to Section 2054.5192, Texas Government Code, Contractor and its Subcontractors, consultants, officers, and employees who are granted access to Component\u2019s computer system also known as Component\u2019s information system, must complete a cybersecurity training program certified under Section 2054.519, Texas Government Code, as selected by the Component. The cybersecurity training program must be completed during the term and any renewal period of this Agreement. Contractor shall verify in writing completion of the program to the Component within the first thirty (30) calendar days of the term and any renewal period of this Agreement. Failure to comply with the requirements of this section are grounds for termination for cause of the Agreement.", "samples": [{"hash": "cQpI3rcUmaZ", "uri": "/contracts/cQpI3rcUmaZ#cybersecurity-training-program", "label": "Construction Contract", "score": 31.0800037384, "published": true}, {"hash": "b4e6FX31nU8", "uri": "/contracts/b4e6FX31nU8#cybersecurity-training-program", "label": "Construction Contract", "score": 31.0800037384, "published": true}, {"hash": "1N2P7DuUDPC", "uri": "/contracts/1N2P7DuUDPC#cybersecurity-training-program", "label": "Construction Contract", "score": 31.0800037384, "published": true}], "snippet_links": [{"key": "pursuant-to-section", "type": "definition", "offset": [0, 19]}, {"key": "texas-government-code", "type": "clause", "offset": [31, 52]}, {"key": "contractor-and-its-subcontractors", "type": "clause", "offset": [54, 87]}, {"key": "employees-who", "type": "clause", "offset": [116, 129]}, {"key": "access-to", "type": "definition", "offset": [142, 151]}, {"key": "computer-system", "type": "definition", "offset": [164, 179]}, {"key": "information-system", "type": "clause", "offset": [206, 224]}, {"key": "as-selected", "type": "definition", "offset": [330, 341]}, {"key": "must-be-completed", "type": "clause", "offset": [395, 412]}, {"key": "during-the-term", "type": "clause", "offset": [413, 428]}, {"key": "period-of-this-agreement", "type": "clause", "offset": [445, 469]}, {"key": "contractor-shall", "type": "clause", "offset": [471, 487]}, {"key": "in-writing", "type": "clause", "offset": [495, 505]}, {"key": "completion-of-the-program", "type": "clause", "offset": [506, 531]}, {"key": "calendar-days", "type": "clause", "offset": [578, 591]}, {"key": "the-requirements", "type": "clause", "offset": [669, 685]}, {"key": "termination-for-cause", "type": "clause", "offset": [718, 739]}, {"key": "the-agreement", "type": "clause", "offset": [743, 756]}], "hash": "4828877c6ab619a7dfb9249ee5199628", "id": 3}, {"size": 13, "snippet": "All GRANTEES must complete a cybersecurity training. If the GRANTEE is a local unit of government, GRANTEE represents and warrants its compliance with Section 2054.5191 of the Texas Government Code relating to the cybersecurity training program for local government employees who have access to a local government computer system or database. If the GRANTEE has access to any state computer system or database, GRANTEE shall complete cybersecurity training and verify completion of the training program to the Agency pursuant to and in accordance with Section 2054.5192 of the", "samples": [{"hash": "gdsxSON3LOk", "uri": "/contracts/gdsxSON3LOk#cybersecurity-training-program", "label": "Savns Grant Contract", "score": 32.6731529236, "published": true}, {"hash": "dOIhnbEKwdC", "uri": "/contracts/dOIhnbEKwdC#cybersecurity-training-program", "label": "Grant Contract", "score": 32.6567268372, "published": true}, {"hash": "hJmNw0VIt9N", "uri": "/contracts/hJmNw0VIt9N#cybersecurity-training-program", "label": "Grant Contract", "score": 32.6539878845, "published": true}], "snippet_links": [{"key": "the-grantee", "type": "clause", "offset": [56, 67]}, {"key": "local-unit-of-government", "type": "definition", "offset": [73, 97]}, {"key": "compliance-with-section", "type": "clause", "offset": [135, 158]}, {"key": "texas-government-code", "type": "clause", "offset": [176, 197]}, {"key": "relating-to", "type": "definition", "offset": [198, 209]}, {"key": "employees-who", "type": "clause", "offset": [266, 279]}, {"key": "access-to", "type": "definition", "offset": [285, 294]}, {"key": "government-computer-system", "type": "definition", "offset": [303, 329]}, {"key": "any-state", "type": "definition", "offset": [372, 381]}, {"key": "the-training", "type": "clause", "offset": [482, 494]}, {"key": "the-agency", "type": "clause", "offset": [506, 516]}, {"key": "in-accordance-with", "type": "clause", "offset": [533, 551]}], "hash": "d0fcaaa92a7782f2008f19018ea1bd4e", "id": 4}, {"size": 7, "snippet": "Pursuant to Section 2054.5192, Texas Government Code, Contractor and its subcontractors, officers, and employees must complete a cybersecurity training program certified under Section 2054.519, Texas Government Code and selected by the University. The cybersecurity training program must be completed by Contractor and its subcontractors, officers, and employees during the term and any renewal period of this Agreement. Contractor shall verify completion of the program to the University.]", "samples": [{"hash": "2MKwxcEqXQj", "uri": "/contracts/2MKwxcEqXQj#cybersecurity-training-program", "label": "Vending Machine Services Contract", "score": 33.6460876465, "published": true}, {"hash": "a5S0kj5QloP", "uri": "/contracts/a5S0kj5QloP#cybersecurity-training-program", "label": "Vending Machine Services Contract", "score": 28.491230011, "published": true}, {"hash": "1cthbfgcHFk", "uri": "/contracts/1cthbfgcHFk#cybersecurity-training-program", "label": "Vending Machine Services Contract", "score": 23.848733902, "published": true}], "snippet_links": [{"key": "pursuant-to-section", "type": "definition", "offset": [0, 19]}, {"key": "texas-government-code", "type": "clause", "offset": [31, 52]}, {"key": "contractor-and-its-subcontractors", "type": "clause", "offset": [54, 87]}, {"key": "employees-must", "type": "clause", "offset": [103, 117]}, {"key": "by-the-university", "type": "clause", "offset": [229, 246]}, {"key": "by-contractor", "type": "clause", "offset": [301, 314]}, {"key": "during-the-term", "type": "clause", "offset": [363, 378]}, {"key": "period-of-this-agreement", "type": "clause", "offset": [395, 419]}, {"key": "contractor-shall", "type": "clause", "offset": [421, 437]}, {"key": "completion-of-the-program", "type": "clause", "offset": [445, 470]}, {"key": "to-the-university", "type": "clause", "offset": [471, 488]}], "hash": "9bd707de682cca1b951e5de8c3ab1c97", "id": 5}, {"size": 7, "snippet": "Pursuant to Section 2054.5192, Texas Government Code, PROVIDER and its employees, officers, and subcontractors who have access to the A&M System\u2019s computer system and/or database must complete a cybersecurity training program certified under Section 2054.519, Texas Government Code, and selected by the A&M System. The cybersecurity training program must be completed by PROVIDER and its employees, officers, and subcontractors during the Term and any renewal period of this Agreement. PROVIDER shall verify completion of the program in writing to the A&M System within the first thirty (30) calendar days of the Term and any renewal period of this Agreement. PROVIDER acknowledges and agrees that its failure to comply with the requirements of this Section are grounds for the A&M System to terminate this Agreement for cause.", "samples": [{"hash": "gFtIE6K2GPU", "uri": "/contracts/gFtIE6K2GPU#cybersecurity-training-program", "label": "Software as a Service Agreement", "score": 36.3774032593, "published": true}, {"hash": "iMyg80ruY6A", "uri": "/contracts/iMyg80ruY6A#cybersecurity-training-program", "label": "Services Agreement", "score": 36.1075396523, "published": true}, {"hash": "ftUi8JINmGp", "uri": "/contracts/ftUi8JINmGp#cybersecurity-training-program", "label": "Master Agreement", "score": 35.72397995, "published": true}], "snippet_links": [{"key": "pursuant-to-section", "type": "definition", "offset": [0, 19]}, {"key": "texas-government-code", "type": "clause", "offset": [31, 52]}, {"key": "access-to-the", "type": "clause", "offset": [120, 133]}, {"key": "am-system", "type": "definition", "offset": [134, 144]}, {"key": "computer-system", "type": "definition", "offset": [147, 162]}, {"key": "by-provider", "type": "clause", "offset": [368, 379]}, {"key": "during-the-term", "type": "clause", "offset": [428, 443]}, {"key": "period-of-this-agreement", "type": "clause", "offset": [460, 484]}, {"key": "provider-shall", "type": "clause", "offset": [486, 500]}, {"key": "completion-of-the-program", "type": "clause", "offset": [508, 533]}, {"key": "in-writing", "type": "clause", "offset": [534, 544]}, {"key": "calendar-days", "type": "clause", "offset": [592, 605]}, {"key": "the-requirements", "type": "clause", "offset": [725, 741]}, {"key": "agreement-for-cause", "type": "clause", "offset": [807, 826]}], "hash": "18058484e2925657832e97dff653d36f", "id": 6}, {"size": 4, "snippet": "The Supreme Court will take necessary steps to ensure the recipients and subrecipients of grant funds under this contract represents and warrants it compliance with Section 2054.5191 of the Texas Government Code relating to the cybersecurity training program for local government employees who have access to a local government computer system or database.", "samples": [{"hash": "ijvFUz7ZBz4", "uri": "/contracts/ijvFUz7ZBz4#cybersecurity-training-program", "label": "Crime Victim Civil Legal Services Grant Contract", "score": 32.6731529236, "published": true}, {"hash": "1tmuwvZv8uj", "uri": "/contracts/1tmuwvZv8uj#cybersecurity-training-program", "label": "Contract", "score": 31.7506580353, "published": true}, {"hash": "6QWJ5Jnbi5L", "uri": "/contracts/6QWJ5Jnbi5L#cybersecurity-training-program", "label": "Contract", "score": 30.6310749054, "published": true}], "snippet_links": [{"key": "the-supreme-court", "type": "clause", "offset": [0, 17]}, {"key": "necessary-steps", "type": "clause", "offset": [28, 43]}, {"key": "to-ensure", "type": "clause", "offset": [44, 53]}, {"key": "the-recipients", "type": "clause", "offset": [54, 68]}, {"key": "grant-funds", "type": "definition", "offset": [90, 101]}, {"key": "under-this-contract", "type": "clause", "offset": [102, 121]}, {"key": "compliance-with-section", "type": "clause", "offset": [149, 172]}, {"key": "texas-government-code", "type": "clause", "offset": [190, 211]}, {"key": "relating-to", "type": "definition", "offset": [212, 223]}, {"key": "employees-who", "type": "clause", "offset": [280, 293]}, {"key": "access-to", "type": "definition", "offset": [299, 308]}, {"key": "government-computer-system", "type": "definition", "offset": [317, 343]}], "hash": "4bbb69f22f4c376e2f64f1467bf4b501", "id": 7}, {"size": 3, "snippet": "If Contractor and/or its subcontractors, officers, or employees will have an account on a state computer system (for example, to access a database on that system), then pursuant to Section 2054.5192, Texas Government Code, Contractor and its subcontractors, officers, and employees must complete a cybersecurity training program certified under Section 2054.519, Texas Government Code and selected by the University. The cybersecurity training program must be completed by Contractor and its subcontractors, officers, and employees during the term and any renewal period of this Agreement. Contractor shall verify completion of the program to the University. University and Contractor have executed and delivered this Agreement to be effective as of the Effective Date. By: By: ___________________________ Name: ______________________________ Name: ________________________ Title: ______________________________ Title: __________________________ Attest: ________________________ Corporate Secretary] EXHIBIT A \u2013 Scope of Work EXHIBIT B \u2013 Schedule Notwithstanding the foregoing, the cumulative amount of Service Fees remitted by University to Contractor will not exceed $_______________ (Fee Cap) without the prior written approval of University. In addition, total fees for each Phase of Work will not exceed the following specified amounts without the prior written approval of University: _________________ _________________ If University submits, in advance, a written request for additional services not contemplated or reasonably inferred by this Agreement, Contractor will be paid for actual hours incurred by Contractor\u2019s personnel directly and solely in support of the additional services at the Rates provided above.", "samples": [{"hash": "hGT1iAvH6Tu", "uri": "/contracts/hGT1iAvH6Tu#cybersecurity-training-program", "label": "Contract Agreement", "score": 31.183008194, "published": true}, {"hash": "jOelZu7mobV", "uri": "/contracts/jOelZu7mobV#cybersecurity-training-program", "label": "Contract Agreement", "score": 31.1337356567, "published": true}, {"hash": "QIZkLSdwFK", "uri": "/contracts/QIZkLSdwFK#cybersecurity-training-program", "label": "Contract Agreement", "score": 31.0132904053, "published": true}], "snippet_links": [{"key": "contractor-and-or", "type": "clause", "offset": [3, 20]}, {"key": "employees-will", "type": "clause", "offset": [54, 68]}, {"key": "computer-system", "type": "definition", "offset": [96, 111]}, {"key": "for-example", "type": "clause", "offset": [113, 124]}, {"key": "pursuant-to-section", "type": "definition", "offset": [169, 188]}, {"key": "texas-government-code", "type": "clause", "offset": [200, 221]}, {"key": "contractor-and-its-subcontractors", "type": "clause", "offset": [223, 256]}, {"key": "employees-must", "type": "clause", "offset": [272, 286]}, {"key": "by-the-university", "type": "clause", "offset": [398, 415]}, {"key": "by-contractor", "type": "clause", "offset": [470, 483]}, {"key": "during-the-term", "type": "clause", "offset": [532, 547]}, {"key": "period-of-this-agreement", "type": "clause", "offset": [564, 588]}, {"key": "contractor-shall", "type": "clause", "offset": [590, 606]}, {"key": "completion-of-the-program", "type": "clause", "offset": [614, 639]}, {"key": "to-the-university", "type": "clause", "offset": [640, 657]}, {"key": "executed-and-delivered", "type": "clause", "offset": [690, 712]}, {"key": "agreement-to-be", "type": "clause", "offset": [718, 733]}, {"key": "effective-as-of-the-effective-date", "type": "clause", "offset": [734, 768]}, {"key": "corporate-secretary", "type": "definition", "offset": [979, 998]}, {"key": "exhibit-a", "type": "definition", "offset": [1000, 1009]}, {"key": "scope-of-work", "type": "clause", "offset": [1012, 1025]}, {"key": "exhibit-b", "type": "definition", "offset": [1026, 1035]}, {"key": "notwithstanding-the-foregoing", "type": "clause", "offset": [1047, 1076]}, {"key": "service-fees", "type": "clause", "offset": [1103, 1115]}, {"key": "by-university", "type": "clause", "offset": [1125, 1138]}, {"key": "contractor-will", "type": "clause", "offset": [1142, 1157]}, {"key": "fee-cap", "type": "clause", "offset": [1187, 1194]}, {"key": "approval-of", "type": "definition", "offset": [1222, 1233]}, {"key": "in-addition", "type": "clause", "offset": [1246, 1257]}, {"key": "total-fees", "type": "definition", "offset": [1259, 1269]}, {"key": "phase-of", "type": "clause", "offset": [1279, 1287]}, {"key": "specified-amounts", "type": "clause", "offset": [1323, 1340]}, {"key": "in-advance", "type": "clause", "offset": [1450, 1460]}, {"key": "request-for-additional-services", "type": "clause", "offset": [1472, 1503]}, {"key": "by-this-agreement", "type": "clause", "offset": [1544, 1561]}, {"key": "actual-hours", "type": "definition", "offset": [1591, 1603]}, {"key": "the-additional-services", "type": "clause", "offset": [1673, 1696]}, {"key": "the-rates", "type": "clause", "offset": [1700, 1709]}], "hash": "ed175ce7faae4a7fad6226d46a14bb97", "id": 8}, {"size": 3, "snippet": "If Contractor and/or its subcontractors, officers, or employees will have an account on a state computer system (for example, to access a database on that system), then pursuant to Section 2054.5192, Texas Government Code, Contractor and its subcontractors, officers, and employees must complete a cybersecurity training program certified under Section 2054.519, Texas Government Code and selected by UTMB. The cybersecurity training program must be completed by Contractor and its subcontractors, officers, and employees during the term and any renewal period of this Agreement. Contractor shall verify completion of the program to UTMB.", "samples": [{"hash": "eU1uOtoZN6A", "uri": "/contracts/eU1uOtoZN6A#cybersecurity-training-program", "label": "General Terms and Conditions", "score": 26.7248458862, "published": true}, {"hash": "6IE9K6Ubn7V", "uri": "/contracts/6IE9K6Ubn7V#cybersecurity-training-program", "label": "General Terms and Conditions", "score": 26.578371048, "published": true}], "snippet_links": [{"key": "contractor-and-or", "type": "clause", "offset": [3, 20]}, {"key": "employees-will", "type": "clause", "offset": [54, 68]}, {"key": "computer-system", "type": "definition", "offset": [96, 111]}, {"key": "for-example", "type": "clause", "offset": [113, 124]}, {"key": "pursuant-to-section", "type": "definition", "offset": [169, 188]}, {"key": "texas-government-code", "type": "clause", "offset": [200, 221]}, {"key": "contractor-and-its-subcontractors", "type": "clause", "offset": [223, 256]}, {"key": "employees-must", "type": "clause", "offset": [272, 286]}, {"key": "by-contractor", "type": "clause", "offset": [460, 473]}, {"key": "during-the-term", "type": "clause", "offset": [522, 537]}, {"key": "period-of-this-agreement", "type": "clause", "offset": [554, 578]}, {"key": "contractor-shall", "type": "clause", "offset": [580, 596]}, {"key": "completion-of-the-program", "type": "clause", "offset": [604, 629]}], "hash": "f6f2d3a393f727bdc821dc267fd869bd", "id": 9}, {"size": 2, "snippet": "Pursuant to Section 2054.5192, Texas Government Code, Vendor and its subcontractors, officers, and employees, who are provided with credentials granting access to TXST\u2019s computer system also known as TXST\u2019s information system, must complete a cybersecurity training program certified under Section 2054.519, Texas Government Code as selected by TXST. The cybersecurity training program must be completed during the term and any renewal period of this Order. Vendor shall verify in writing completion of the program to TXST within the first thirty (30) calendar days of the term and any renewal period of this Order. Failure to comply with the requirements of this section are grounds for termination for cause of this Order.", "samples": [{"hash": "8dAbTVhdeG", "uri": "/contracts/8dAbTVhdeG#cybersecurity-training-program", "label": "Purchase Order", "score": 34.0192489624, "published": true}, {"hash": "zLSgjL6fDs", "uri": "/contracts/zLSgjL6fDs#cybersecurity-training-program", "label": "Purchase Order Terms and Conditions", "score": 33.9396018982, "published": true}], "snippet_links": [{"key": "pursuant-to-section", "type": "definition", "offset": [0, 19]}, {"key": "texas-government-code", "type": "clause", "offset": [31, 52]}, {"key": "access-to", "type": "definition", "offset": [153, 162]}, {"key": "computer-system", "type": "definition", "offset": [170, 185]}, {"key": "information-system", "type": "clause", "offset": [207, 225]}, {"key": "as-selected", "type": "definition", "offset": [330, 341]}, {"key": "must-be-completed", "type": "clause", "offset": [386, 403]}, {"key": "during-the-term", "type": "clause", "offset": [404, 419]}, {"key": "period-of", "type": "clause", "offset": [436, 445]}, {"key": "vendor-shall", "type": "clause", "offset": [458, 470]}, {"key": "in-writing", "type": "clause", "offset": [478, 488]}, {"key": "completion-of-the-program", "type": "clause", "offset": [489, 514]}, {"key": "calendar-days", "type": "clause", "offset": [552, 565]}, {"key": "the-requirements", "type": "clause", "offset": [639, 655]}, {"key": "termination-for-cause", "type": "clause", "offset": [688, 709]}], "hash": "6d95d40a9f24744e14837e5e810bc1cb", "id": 10}], "next_curs": "CmcSYWoVc35sYXdpbnNpZGVyY29udHJhY3RzckMLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IidjeWJlcnNlY3VyaXR5LXRyYWluaW5nLXByb2dyYW0jMDAwMDAwMGEMogECZW4YACAA", "clause": {"size": 117, "children": [["local-government-system", "Local Government System"], ["sate-contractor", "Sate Contractor"], ["maintenance-of-the-security-of-ferpa-records", "Maintenance of the Security of FERPA Records"], ["disclosure", "Disclosure"], ["five-year-exclusion-for-improper-disclosure-of-education-records", "Five Year Exclusion for Improper Disclosure of Education Records"]], "parents": [["special-terms-and-conditions", "Special Terms and Conditions"], ["miscellaneous-provisions", "Miscellaneous Provisions"], ["miscellaneous", "Miscellaneous"], ["information-technology", "Information Technology"], ["scope-of-work", "SCOPE OF WORK"]], "title": "Cybersecurity Training Program", "id": "cybersecurity-training-program", "related": [["cybersecurity-training", "Cybersecurity Training", "Cybersecurity Training"], ["training-program", "Training Program", "Training Program"], ["safety-training", "Safety Training", "Safety Training"], ["supplier-diversity", "Supplier Diversity", "Supplier Diversity"], ["technical-training", "Technical Training", "Technical Training"]], "related_snippets": [], "updated": "2025-07-24T06:48:57+00:00", "also_ask": ["What minimum standards or certifications should the training program meet to ensure legal defensibility?", "How can the clause allocate responsibility and liability for training failures or breaches?", "What mechanisms ensure regular updates to the program as cyber threats evolve?", "How does this clause compare to industry best practices and regulatory requirements?", "What evidence or documentation is needed to prove compliance in litigation or regulatory investigations?"], "drafting_tip": "Specify training frequency and content to ensure compliance; assign responsibility to clarify accountability; require documentation to facilitate audits.", "explanation": "The Cybersecurity Training Program clause requires an organization to implement and maintain a structured program to educate employees about cybersecurity risks and best practices. Typically, this involves regular training sessions, mandatory completion of online modules, and periodic assessments to ensure staff are aware of current threats and proper security protocols. The core function of this clause is to reduce the risk of security breaches caused by human error, thereby strengthening the organization's overall cybersecurity posture."}, "json": true, "cursor": ""}}