{"component": "definition", "props": {"groups": [{"snippet": "means the Security and Information Risk Advisor (\u2587\u2587\u2587\u2587) is a role defined under the NCSC Certified Professional (CCP) Scheme. See also: Certified Cyber Professional (CCP) assured service - \u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587", "size": 58, "snippet_links": [{"key": "security-and-information-risk-advisor", "type": "definition", "offset": [10, 47]}, {"key": "certified-professional", "type": "definition", "offset": [88, 110]}], "samples": [{"hash": "h60U2QBtlPq", "uri": "/contracts/h60U2QBtlPq#sira", "label": "Accountability Agreement", "score": 35.3092422485, "published": true}, {"hash": "jWqEIX3kdB2", "uri": "/contracts/jWqEIX3kdB2#sira", "label": "Accountability Agreement", "score": 35.3024482727, "published": true}, {"hash": "g1RmLorpkFb", "uri": "/contracts/g1RmLorpkFb#sira", "label": "Accountability Agreement", "score": 34.2138023376, "published": true}], "hash": "e4156b266c6a5271d60619e1921da45e", "id": 1}, {"snippet": "the Security and Information Risk Advisor (\u2587\u2587\u2587\u2587) is a role defined under the NCSC Certified Professional (CCP) Scheme. See also: \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/articles/about-certified- professional-scheme", "size": 51, "snippet_links": [{"key": "security-and-information-risk-advisor", "type": "definition", "offset": [4, 41]}, {"key": "certified-professional", "type": "definition", "offset": [82, 104]}], "samples": [{"hash": "eQ9alIbeLdB", "uri": "/contracts/eQ9alIbeLdB#sira", "label": "G Cloud 14 Call Off Contract", "score": 36.397693634, "published": true}, {"hash": "l4GU7hNCLPy", "uri": "/contracts/l4GU7hNCLPy#sira", "label": "Call Off Contract", "score": 35.2144737244, "published": true}, {"hash": "1Qx5alDxCF1", "uri": "/contracts/1Qx5alDxCF1#sira", "label": "Call Off Contract", "score": 34.8109474182, "published": true}], "hash": "f3be4efe38ad05912fe7e35f027c73d3", "id": 2}, {"snippet": "the Security and Information Risk Advisor (SIRA) is a role defined under the CESG CESG Certified Professional Scheme", "size": 3, "snippet_links": [{"key": "security-and-information-risk-advisor", "type": "definition", "offset": [4, 41]}, {"key": "certified-professional", "type": "definition", "offset": [87, 109]}], "samples": [{"hash": "6NUALV3mRBT", "uri": "/contracts/6NUALV3mRBT#sira", "label": "Call Off Agreement", "score": 28.3717308044, "published": true}, {"hash": "fCzEzC8QrFH", "uri": "/contracts/fCzEzC8QrFH#sira", "label": "Call Off Agreement", "score": 28.3689937592, "published": true}, {"hash": "8obTckwoxRY", "uri": "/contracts/8obTckwoxRY#sira", "label": "Call Off Agreement", "score": 28.3689937592, "published": true}], "hash": "8b3755f4d9d5d4b939deb6c7e3e1a442", "id": 3}, {"snippet": "has the meaning set forth in the recitals of this Agreement.", "size": 2, "snippet_links": [{"key": "the-recitals", "type": "clause", "offset": [29, 41]}, {"key": "this-agreement", "type": "clause", "offset": [45, 59]}], "samples": [{"hash": "95k9DJ0VbPa", "uri": "/contracts/95k9DJ0VbPa#sira", "label": "Transaction Agreement (StepStone Group Inc.)", "score": 35.1026687622, "published": true}, {"hash": "8Ok942uLchY", "uri": "/contracts/8Ok942uLchY#sira", "label": "Transaction Agreement (StepStone Group Inc.)", "score": 35.1026687622, "published": true}], "hash": "715c83430c55bdfbdefe315fb08520bd", "id": 4}, {"snippet": "the Security and Information Risk Advisor (\u2587\u2587\u2587\u2587) is a role defined under the CESG CESG Certified Professional Scheme", "size": 2, "snippet_links": [{"key": "security-and-information-risk-advisor", "type": "definition", "offset": [4, 41]}, {"key": "certified-professional", "type": "definition", "offset": [87, 109]}], "samples": [{"hash": "7tMW5SqJY5d", "uri": "/contracts/7tMW5SqJY5d#sira", "label": "G Cloud Services Call Off Contract", "score": 28.5387096405, "published": true}, {"hash": "2J9ZOTtkezT", "uri": "/contracts/2J9ZOTtkezT#sira", "label": "Call Off Contract", "score": 28.3717308044, "published": true}], "hash": "c851915c939debd12997f1a728052923", "id": 5}, {"snippet": "means the Borrower\u2019s animal identification and registration system.", "size": 2, "snippet_links": [{"key": "the-borrower", "type": "clause", "offset": [6, 18]}, {"key": "registration-system", "type": "clause", "offset": [47, 66]}], "samples": [{"hash": "f9y61aBLFw8", "uri": "/contracts/f9y61aBLFw8#sira", "label": "Loan Agreement", "score": 26.3552360535, "published": true}, {"hash": "hg8LczAWmsz", "uri": "/contracts/hg8LczAWmsz#sira", "label": "Loan Agreement", "score": 21.0, "published": true}], "hash": "7bda9511bdccb240dbd7874af71f044c", "id": 6}, {"snippet": "the Security and Information Risk Advisor (\u2587\u2587\u2587\u2587) is a role defined under the NCSC Certified Professional (CCP) Scheme. See also: \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/articles/about- certifiedprofessional-scheme \u201cService Standards\u201d The Service Standard helps teams to create and run great public services ensuring user needs are at the centre of design \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/service-manual/service-standard \u201cSPF\u201d \u201cHMG Security Policy Framework\u201d This is the definitive HMG Security Policy which describes the expectations of the Cabinet Secretary and Government\u2019s Official Committee on Security on how HMG organisations and third parties handling HMG information and other assets will apply protective security to ensure HMG can function effectively, efficiently and securely. \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587/government/publications/securitypolicy- framework \u201cTechnology Code of Practice\u201d The Technology Code of Practice is a set of criteria to help", "size": 2, "snippet_links": [{"key": "security-and-information-risk-advisor", "type": "definition", "offset": [4, 41]}, {"key": "certified-professional", "type": "definition", "offset": [82, 104]}, {"key": "service-standards", "type": "definition", "offset": [199, 216]}, {"key": "the-service-standard", "type": "clause", "offset": [218, 238]}, {"key": "public-services", "type": "clause", "offset": [275, 290]}, {"key": "the-centre", "type": "clause", "offset": [318, 328]}, {"key": "hmg-security-policy-framework", "type": "definition", "offset": [397, 426]}, {"key": "cabinet-secretary", "type": "definition", "offset": [511, 528]}, {"key": "official-committee", "type": "definition", "offset": [546, 564]}, {"key": "on-security", "type": "clause", "offset": [565, 576]}, {"key": "third-parties", "type": "clause", "offset": [606, 619]}, {"key": "other-assets", "type": "definition", "offset": [649, 661]}, {"key": "protective-security", "type": "clause", "offset": [673, 692]}, {"key": "to-ensure", "type": "clause", "offset": [693, 702]}, {"key": "code-of-practice", "type": "definition", "offset": [840, 856]}, {"key": "the-technology", "type": "definition", "offset": [858, 872]}], "samples": [{"hash": "b6Yu4Z4c8xY", "uri": "/contracts/b6Yu4Z4c8xY#sira", "label": "Contract for Services", "score": 34.9913520813, "published": true}, {"hash": "eXp65OZqtu1", "uri": "/contracts/eXp65OZqtu1#sira", "label": "Contract for Services", "score": 34.7586593628, "published": true}], "hash": "5e0a7ec311fbb4c3e62ba8173cc4657d", "id": 7}, {"snippet": "has the meaning set forth in the introductory paragraph of this Agreement.", "size": 1, "snippet_links": [{"key": "introductory-paragraph", "type": "definition", "offset": [33, 55]}, {"key": "this-agreement", "type": "clause", "offset": [59, 73]}], "samples": [{"hash": "6gP5xUy6SJ4", "uri": "/contracts/6gP5xUy6SJ4#sira", "label": "Transaction Agreement (StepStone Group Inc.)", "score": 35.1026687622, "published": true}], "hash": "023143755387a862f548e4fc46d62fd6", "id": 8}, {"snippet": "means the Storage and Interstate Release Agreement entered into contemporaneously with this Agreement by AWBA, SNWA, CRCN, and the Secretary.", "size": 1, "snippet_links": [{"key": "release-agreement", "type": "clause", "offset": [33, 50]}, {"key": "entered-into", "type": "clause", "offset": [51, 63]}, {"key": "this-agreement", "type": "clause", "offset": [87, 101]}, {"key": "the-secretary", "type": "clause", "offset": [127, 140]}], "samples": [{"hash": "cP2piPUlZng", "uri": "https://waterbank.az.gov/sites/default/files/2023-05/2002.12.18_Meeting%20Packet.pdf", "label": "waterbank.az.gov", "score": 18.0407428741, "published": false}], "hash": "be76fd99a62f25eab083d56b9382275f", "id": 9}, {"snippet": "the Security and Information Risk Advisor (SIRA) is a role defined under the CESG CESG Certified Professional Scheme The Contractor shall comply with Departmental Security Standards for Contractors which include but are not constrained to the following clauses. Where the Contractor will provide ICT products or Services or otherwise handle information at OFFICIAL on behalf of the Department, the requirements under Cabinet Office Procurement Policy Note \u2013 Use of Cyber Essentials Scheme certification - Action Note 09/14 25 September 2014, or any subsequent updated document, are mandated; that \u201ccontractors supplying products or services to HMG shall have achieved, and retain certification at the appropriate level, under the HMG Cyber Essentials Scheme\u201d. The certification scope must be relevant to the services supplied to, or on behalf of, the Department.", "size": 1, "snippet_links": [{"key": "security-and-information-risk-advisor", "type": "definition", "offset": [4, 41]}, {"key": "certified-professional", "type": "definition", "offset": [87, 109]}, {"key": "the-contractor-shall", "type": "clause", "offset": [117, 137]}, {"key": "comply-with", "type": "definition", "offset": [138, 149]}, {"key": "departmental-security-standards", "type": "clause", "offset": [150, 181]}, {"key": "will-provide", "type": "clause", "offset": [283, 295]}, {"key": "products-or-services", "type": "definition", "offset": [300, 320]}, {"key": "on-behalf-of", "type": "clause", "offset": [365, 377]}, {"key": "the-department", "type": "clause", "offset": [378, 392]}, {"key": "the-requirements", "type": "clause", "offset": [394, 410]}, {"key": "cabinet-office", "type": "definition", "offset": [417, 431]}, {"key": "procurement-policy", "type": "definition", "offset": [432, 450]}, {"key": "cyber-essentials-scheme-certification", "type": "clause", "offset": [465, 502]}, {"key": "september-2014", "type": "clause", "offset": [526, 540]}, {"key": "certification-scope", "type": "clause", "offset": [764, 783]}, {"key": "services-supplied", "type": "clause", "offset": [808, 825]}], "samples": [{"hash": "aUk0gap0V6p", "uri": "/contracts/aUk0gap0V6p#sira", "label": "Contract", "score": 28.5633468628, "published": true}], "hash": "09b64ebb01fb08f4018421c288ec2640", "id": 10}], "next_curs": "ClESS2oVc35sYXdpbnNpZGVyY29udHJhY3Rzci0LEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiINc2lyYSMwMDAwMDAwYQyiAQJlbhgAIAA=", "definition": {"snippet": "means the Security and Information Risk Advisor (\u2587\u2587\u2587\u2587) is a role defined under the NCSC Certified Professional (CCP) Scheme. See also: Certified Cyber Professional (CCP) assured service - \u2587\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587", "size": 129, "title": "SIRA", "id": "sira", "examples": ["This will include obtaining any necessary professional security resources required to support the Contractor\u2019s and sub-contractor\u2019s security assurance activities such as: a NCSC Certified Cyber Security Consultancy (CCSC) or NCSC Certified Professional (CCP) Security and Information Risk Advisor (<strong>SIRA</strong>)."], "related": [["tabarru", "Tabarru", "Tabarru"], ["popia", "POPIA", "POPIA"], ["lira", "LIRA", "LIRA"], ["sadc", "SADC", "SADC"], ["ojeu", "OJEU", "OJEU"]], "related_snippets": [], "updated": "2025-07-26T06:10:51+00:00"}, "json": true, "cursor": ""}}