Security Training Sample Clauses

Security Training a. In accordance with Section 2054.5192 of the Texas Government Code, each Engineer Personnel that will access a TxDOT computer system or database must complete a TxDOT approved cybersecurity training program that is certified under Section 2054.5192 of the Texas Government Code. The training program must be completed by each Engineer Personnel during the term of the contract and during any renewal period. Engineer shall provide verification of completion of the cybersecurity training program in a method designated by State.
AutoNDA by SimpleDocs
Security Training. A. Microsoft informs its personnel about relevant security procedures and their respective roles. Microsoft also informs its personnel of possible consequences of breaching the security rules and procedures.
Security Training. Staff will be required to attend a security induction course. The cost of this will be met by the Authority at the rates applicable for the purposes of the Contract.
Security Training. The Contractor shall ensure all Contractor and subContractor employees who require access to or who perform services on a Government installation are aware of and have conducted the appropriate Government security training as summarized below. Training requirements are subject to change as conditions, policies, or regulations change, and may vary between units, due to the type, focus, or environment. Access to on- line training is usually from a Government account (on-post computer and/or CAC-enabled access), but some may be conducted from other source(s). The table below summarizes relevant Government security-related training: What Intended Audience When Anti-terrorism (AT) Level I All (performance in an Army controlled installation, facility, or area) At start of contract performance and annually thereafter Access and General Protection/Security Policy and Procedures All (performance in an Army controlled installation, facility, or area) At start of contract performance and when conditions change AT Awareness Training CONUS/OCONUS travel 30 days or less prior to CONUS/OCONUS travel Access to Government Information Systems All who are given access to a Government computer/e-mail account At start of contract performance and annually thereafter OPSEC Training All (performance in an Army controlled installation, facility, or area) At start of contract performance and annually thereafter Information Assurance ((IA)/Information Technology (IT) training All who are given access to Government computers or an e-mail account At start of contract performance and annually thereafter Information Assurance ((IA)/Information Technology (IT) certification) Any elevated-level access (e.g. IMO- type work, knowledge management, SharePoint, web design) Upon contract award or start of contract performance Security briefing FAR 52.204-2. Contractors requiring handling of/access to Classified Prior to access AT/OPSEC – deployed* DFARS Clause 252.225-7040. Contractors authorized to accompany the Force (contingency operations, humanitarian, peacekeeping) Prior to deployment AT – theater specific clearance* DFARS Clause 252.225-7043. Performance or Delivery in a foreign country (contingency and non- contingency support) Prior to deployment * These training requirements only apply to performance governed by the specified DFARS clauses. Performance in those areas governed by those DFARS Clauses is expected to occur infrequently for this MAIDIQ, but is included in the interest of f...
Security Training. Jamf will provide appropriate security awareness, education, and training to all Jamf personnel and contractors with access to the Software and Services provided to Customer.
Security Training a. Acuity informs its personnel about relevant security procedures and their respective roles. Acuity also informs its personnel of possible consequences of breaching the security rules and procedures.
Security Training i. All personnel participating in the Root Zone Signing process shall have adequate IT security training.
AutoNDA by SimpleDocs
Security Training. All employees will be required to take such security training as may be determined and required by the Department of Corrections and the Bureau of Correction Education. Except for emergency situations, permanent full-time employees in this bargaining unit will not be required to work independently with inmates until the employee has completed the pre-service training requirements referenced in the Department of Corrections Policy 5.2.1, Minimum Training criteria.
Security Training. 12.4.1 The Operator shall provide an effective training and support programme for staff, to ensure they feel confident to address anti-social behaviour incidents, and command credibility among the travelling public.
Security Training. Regardless of the contract security level required, the Contractor shall be responsible for verifying applicable personnel (including subcontractors) receive all required training. At a minimum, the Contractor’s designated Security Officer shall track the following information: security clearance information; dates possessing CACs; issued and expired dates GCSS-MC PMO Badge; Cybersecurity training; Privacy Act training; Personally Identifiable Information (PII) training; Cybersecurity Workforce (CSWF) certifications; etc. The contractor shall educate employees on the procedures for the handling and production of classified material and documents, and other security measures as described in the PWS in accordance with DoD 5220.22-M.
Time is Money Join Law Insider Premium to draft better contracts faster.