Submission is only possible after all questions have been answered.
0 of 13 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Time has elapsed
Thank you for your submission!
Click below to view your enrolled courses.
My Courses
Register for more courses and continue your learning journey!
Browse Courses
First name
This response will be reviewed and graded after submission.
Surname
Choose your gender
Please select your country of origin.
Which would describe your role?
Engineers (ENG)
Technical roles who have direct access, possibly not mediated by constrained HMI (human machine interface), can change the technical infrastructure
Examples: Software developer, manufacturing / maintenance technician, welding inspector
Administrative staff (ADM)
Non-technical roles with no direct access (maybe through several levels of mediation of IT) to the technical infrastructure or the operation of the system
Examples: Human resource officer, team leader of the shopfloor team, supply chain manager, project manager
Operators (OPS)
Non-technical roles with access to the technical infrastructure through severely constrained HMI (human machine interface). Operates the systems but typically cannot change it
Examples: Rail maintainer, train driver, employee working on the shopfloor, machine operator
Job Title (if you are currently unemployed please write “not applicable”)
Organization Name (if you are currently unemployed please write “not applicable”)
Choose your organisation sector
Is your Organisation an SME?Small and medium-sized enterprises have a maximum of 250 employees and ≤ € 50 million turnover.
These training courses are part of the Digital Europe co-funded project CYRUS (GA n. 101100733) which aims to enhance cybersecurity skills in the transport and manufacturing and develop cybersecurity training tailored to the specific needs of the workforce. All the courses developed reflect emerging cyber threats and specific needs from the transport and manufacturing domains. These needs were identified in the first phase of the project and are based on interviews with representatives from these sectors.
The participation in the training courses does not have any commercial purpose. The involved participants do not receive any monetary benefits by conducting this activity. They participate on a voluntary basis and can withdraw from the activities at any time.
The results from the questionnaires circulated before and after the training courses may be published in project reports, journal articles, conference presentations, and via any other mode of scientific exchange and dissemination considered appropriate, while protecting the participants’ anonymity. Data collected will be published in anonymous form.
Participants’ personal data (first name, last name, gender, organization name, country, email address, job title,employment status) will only be used by the CYRUS Consortium for the purposes of the project. Personal data will be collected, processed and protected according to the General Data Protection Regulation (GDPR) (EU) 2016/679. Participants will have the right to request access to and rectification or erasure of personal data or restriction of processing concerning the data or to object to processing as well as the right to data portability just sending an email to the responsible of data treatment listed hereafter. They will also have the right to lodge a complaint with a supervisory authority.
CYRUS PRIVACY INFORMATION SHEET (ARTS. 13–14 GDPR)
Data Controllers:
All the companies act as Joint Data Controllers pursuant to Article 26 GDPR.
Deep Blue Srl is the single point of contact for data subjects (Email: info@dblue.it)
Categories of Data:
Identification data, contact data, professional data, training-related data.
Purposes of processing:
Organization and delivery of training courses, participant management, certificates, legal compliance and communications.
Legal Basis:
Consent. The provision of data is voluntary but necessary for the purposes mentioned above.
Data Access:
Both companies access a shared database for the stated purposes only.
Retention:
Data will be processed for the duration of the project and during the project evaluation period (up to five years from the final payment in the project or, if the project is subject to any audits, inspections, investigations, etc. – until their completion) or until the consent is withdrawn, unless the law or the legitimate interest of the controller (pursuit of claims) provides for a different period of data processing.
Rights of the Data subjects:
Access, rectification, erasure, restriction, portability, objection, withdrawal of consent at any time without affecting the lawfulness of the processing carried out on the basis of consent before its withdrawal or after exercising the right to object.
Categories of recipients of the data
Personal data may be made available to a data processor providing IT or legal services to above mentioned parties as Joint Data Controllers. The data may also be made available to the European Commission or other authorised institutions in the context of project settlement, audit, and control.
If you selected “Others”, please specify – otherwise please insert “no”
Username or Email Address
Password
Remember Me