Page:Cybersecurity Act 2018.pdf/8

Rh : or transmitted through the computer or computer system for the purpose of identifying cybersecurity threats to the computer or computer system;
 * (g) maintaining control of the cybersecurity of A’s computer or computer system by effecting management, operational and technical controls for the purpose of protecting the computer or computer system against any unauthorised effort to adversely affect its cybersecurity;
 * (h) assessing or monitoring the compliance of an organisation with the organisation’s cybersecurity policy;
 * (i) providing advice in relation to cybersecurity solutions, including—
 * (i) providing advice on a cybersecurity program; or
 * (ii) identifying and analysing cybersecurity threats and providing advice on solutions or management strategies to minimise the risk posed by cybersecurity threats;
 * (j) providing advice in relation to any practices that can enhance cybersecurity;
 * (k) providing training or instruction in relation to any cybersecurity service, including the assessment of the training, instruction or competencies of another person in relation to any such activity;

“cybersecurity service provider” means a person who provides a cybersecurity service;

“cybersecurity solution” means any computer, computer system, computer program or computer service designed for, or purported to be designed for, ensuring or enhancing the cybersecurity of another computer or computer system;

“cybersecurity threat” means an act or activity (whether known or suspected) carried out on or through a computer or