Cybersecurity Requirements definition

Cybersecurity Requirements means all applicable laws, regulations, codes, guidance (from regulatory and advisory bodies, whether mandatory or not), the Data Security and Protection Toolkit, international and national standards, and sanctions relating to security of network and information systems and security breach and incident reporting requirements, including Data Protection Legislation, the NIS Regulations, and to the extent they remain applicable in the UK the Cybersecurity Directive (EU) 2016/1148), Commission Implementing Regulation (EU) 2018/151), all as amended or updated from time to time;
Cybersecurity Requirements means all Applicable Laws relating to security of network and information systems and security breach and incident reporting requirements including Data Protection Law;
Cybersecurity Requirements means the Combined Authority’s cybersecurity requirements as set out in Schedule 10 (Cybersecurity Requirements);

Examples of Cybersecurity Requirements in a sentence

  • We do not warrant that the Services will be uninterrupted or error-free or that the Services will comply with any Heightened Cybersecurity Requirements.

  • The CAW representatives of the Committee are entitled to meet for i at least one hour prior to the Committee as may be necessary for preparation.

  • Heightened Cybersecurity Requirements: any laws, regulations, codes, guidance (from regulatory and advisory bodies.

  • B), and applicable state privacy and cybersecurity laws and regulations, including, but not limited to, California Consumer Privacy Act (to the extent applicable), 11 NYCRR 421-Insurance Regulation No. 173, NYDFS Cybersecurity Requirements For Financial Services Companies, 23 NYCRR 500 et.

  • In addition AVIF (IVIF) and INVESCO hereby represent and warrant that they will be in full compliance with the New York State Department of Financial Services 23 NYCRR 500, Cybersecurity Requirements for Financial Services Companies including having adopted cybersecurity policies and procedures that relate to the security of their respective systems and any nonpublic information that maybe held in those systems.

  • Supplier must also comply with the requirements of Exhibit A (Supplier Global Cybersecurity Requirements).

  • Supplier will comply with the Supplier Global Cybersecurity Requirements set forth in Exhibit A to the Agreement.

  • All cyber security shall meet the Cybersecurity Requirements contained in Appendix A-1.2 “Wind Work Specifications” to the Request for Proposal to which this term sheet is attached.

  • Contractor will comply with the Citywide Cybersecurity Requirements for Vendors and Contractors set forth by the New York City Office of Technology and Innovation and its Office of Cyber Command as they appear at ▇▇▇▇▇://▇▇▇.▇▇▇/infosec.

  • There are not, and have not been in the past three (3) years, any Actions by any Person, or any investigations by any Governmental Authority, pending to which the Company or any of the Company’s Subsidiaries is a named party or, to the knowledge of the Company, threatened in writing against the Company or its Subsidiaries alleging a violation of any Privacy and Cybersecurity Requirements.


More Definitions of Cybersecurity Requirements

Cybersecurity Requirements means all laws, regulations, codes, guidance (from regulatory and advisory bodies, whether mandatory or not), international and national standards, industry schemes and sanctions relating to security of network and information systems and security breach and incident reporting requirements which are from time to time applicable to the Group, including Data Protection Law;
Cybersecurity Requirements means all applicable Laws, regulations, codes, guidance (from regulatory and advisory bodies), international and national standards, and sanctions relating to security of network and information systems and security breach and incident reporting requirements, including the Data Protection Legislation, the Cybersecurity Directive ((EU) 2016/1148), Commission Implementing Regulation ((EU) 2018/151), the Network and Information Systems Regulations 2018 (SI 506/2018), all as amended or updated from time to time, but in each case only to the extent legally binding;
Cybersecurity Requirements. The contractor shall follow Unified Facility Criteria (UFC) 4- 010-06 and Unified Facility Guide Specification (UFGS) 25 05 11, Cybersecurity of Facility- Related Control Systems. UFC 4-010-06 defines the five steps to integrate cybersecurity into the FRCS Design as follows (see UFC 4-010-06 Chapter 3-1.1 Five Steps for Cybersecurity Design): a) Step 1: Based on the organizational mission and details of the control system, the System Owner (SO) and Authorizing Official (AO) determine the Confidentiality, Integrity, and Availability (CIA) impact levels (Low, Moderate, or High) for the control system. The CIA rating for the associated FRCS in this project is: [Designer / Project Engineer note: CIA rating must be obtained from stakeholder] Confidentiality: X (L,M, H) , Integrity: X (L,M,H), Availability: X (L,M,H) b) Step 2: Use the impact levels to select the proper list of controls from NIST SP 800-82. (SEE NOTE BELOW) c) Step 3: Using the DoD master Control Correlation Identifier (CCI) list, create a list of relevant CCIs based on the controls selected in Step 2. (SEE NOTE BELOW) d) Step 4: Categorize CCIs and identify CCIs that require input from the designer or are the designer’s responsibility. (SEE NOTE BELOW) e) Step 5: Include cybersecurity requirements in the project specifications using the UFGS 25 05 11 and provide input to other specifications as required. NOTE: Refer to Appendix H in the UFC which contains tables covering steps 2-4 as listed above. The contractor shall address the CCIs listed for the DESIGNER. The contractor shall provide design specifications to cover the requirement or provide input to others regarding the implementation or lack of feasibility of the CCI relating to the control system components installed, (workstations, servers, building point of connections, network switches, routers and other IP enabled devices…). The DESIGNER controls will have an impact level of LOW or MODERATE. For LOW, LOW, LOW systems, address all DESIGNER controls listed as LOW. If the SO and AO determine the system is designated as MODERATE, the contractor shall address DESIGNER controls listed as LOW and MODERATE.