NCSRC NIRMATA
Home Guides Framework Start Assessment →
Home › Guides › Culture, Training & Awareness › CTA-09
CTA-09 Culture, Training & Awareness 8% of OML score

Are basic training records or acknowledgements maintained?

This question asks: Do you keep written records showing that your staff members received cybersecurity training and understood it? You need proof—like signed forms, test scores, or emails confirming they attended and learned something useful about protecting company data.

⚡
Why This Matters to Your Business

Without training records, you cannot prove to customers, auditors, or regulators that your team actually knows how to handle sensitive data safely. If a data breach happens and regulators ask 'Did you train your staff?', you will have no documentation to show compliance, which can result in penalties under the DPDP Act. For example, if a Bangalore IT services firm suffers a customer data leak and the customer's auditor finds no training records, the contract can be terminated and your reputation damaged. Small businesses often lose contracts because they cannot demonstrate staff awareness during vendor security audits.

📊
What Each Maturity Level Looks Like

Find where your organisation is today. Be honest — the self-assessment is only useful if it reflects reality.

Level 0
Absent

You have no training records at all. Your staff may attend occasional training sessions, but nothing is documented or kept on file.

Level 1
Initial

You maintain scattered records—maybe an email forwarded to a folder, or a handwritten list—but there is no consistent system and records are incomplete or hard to find.

Level 2
Developing

You keep basic signed acknowledgement forms after each training session, stored in a simple spreadsheet or folder, covering all staff who handle data.

Level 3
Defined

You maintain formal training records including date, topic, attendees, and signed acknowledgements; records are organized by employee and reviewed annually for gaps.

Level 4
Managed

You have a documented training program with records showing course content, completion status, quiz/test scores, and follow-up refresher training; records are backed up and easily auditable.

Level 5
Optimised

You operate a continuous learning system with automatically tracked training records, regular audits showing 100% compliance, metrics on training effectiveness, and integration with your incident response process.

🚀
How to Move Up — Practical Steps
StepWhat to DoWhoEffort
0 → 1 Create a simple Google Sheet or Excel file listing all staff members and the date they received any cybersecurity guidance (even informal); ask each person to email back confirming they understood a basic security rule (e.g., not sharing passwords) HR Manager or IT person 2-3 days
1 → 2 Design a one-page training acknowledgement form in English and local language (e.g., Hindi/Marathi), document a 30-minute basic training session on password safety and email security, and collect signed forms from every staff member with date and topic covered IT person with HR input 1 week
2 → 3 Create a formal training policy document stating frequency (e.g., quarterly), topics (phishing, data handling, incident reporting), and assign responsibility for scheduling and record-keeping; maintain a register showing employee name, training date, topic, duration, and signature IT person and HR Manager 2-3 weeks
3 → 4 Set up a simple learning management system (LMS) or use free tools to deliver and track training; include short quizzes or assessments after each session to confirm understanding; archive results with dates and scores IT person 4-6 weeks
4 → 5 Integrate training records into your security information system; conduct quarterly audits of compliance, identify skill gaps, tailor training to roles, and measure training effectiveness through incident reduction metrics; maintain detailed audit trails IT Manager and Compliance Officer Ongoing (monthly reviews)
📁
Evidence You Should Have

Documents and records that prove your maturity level.

  • Signed training acknowledgement forms from all staff members dated and naming the topic (e.g., 'Password Security Training - 15 Jan 2025')
  • Training register or spreadsheet showing employee name, training date, topic, duration, and attendance status
  • Training policy document defining what training will be delivered, how often, and who is responsible
  • Quiz or assessment results (or screenshots of completion) showing staff understood the training material
  • Email or system records confirming training delivery (e.g., calendar invites, training session records, or LMS completion reports)
🔍
What an Auditor Will Ask

Prepare for these questions from customers or third-party reviewers.

  • "Show me your training records for the last 12 months—who was trained, when, on what topics, and how do you know they understood it?"
  • "If a new employee joins, how do you ensure they receive security training before accessing company data?"
  • "Do you have a written training policy, and does it cover all staff or only IT people?"
  • "Can you demonstrate that your training actually changed staff behavior, or do you only keep attendance records?"
  • "What happens if someone fails to complete training or refuses to sign an acknowledgement—how do you handle that?"
🛠
Tools That Work in India
PurposeFree OptionPaid Option
Create and store training records in a simple database Google Forms + Google Sheets (no cost; create form, responses auto-populate to spreadsheet) Zoho People (starting ~₹3,000/year for small team) or Microsoft Forms with Excel
Deliver and track online training; generate completion certificates and records Google Classroom (free; limited features) or Moodle (self-hosted, free but requires setup) Coursera for Business (~₹50,000+/year), Udemy Business (~₹2,00,000+/year), or local LMS like Gyrus (₹5,000-20,000/year for small teams)
Create simple acknowledgement forms and store signed copies Google Docs templates or Microsoft Word; store in shared drive with version control DocuSign (₹10,000-30,000/year) or Adobe Sign (₹10,000-15,000/year for basic)
🛡
How This Makes You More Resilient
When you have training records, your staff is actually more aware of cyber threats and less likely to click phishing links, reuse passwords, or accidentally leak data—directly reducing breach risk. If an incident does happen, you can show regulators and customers that you made a good-faith effort to educate your team, which softens penalties and helps maintain customer trust. You also have proof of compliance for audits, protecting your business reputation and contract renewals.
⚠️
Common Pitfalls in India
  • Treating training as a one-time event: Many Indian MSMEs conduct training once and never refresh it, then claim they trained staff years ago with no recent records—auditors will reject this.
  • Recording attendance but not understanding: You collect signatures on a form but never verify if staff actually understood the content; a quiz or simple acknowledgement statement ('I understand not to share passwords') is necessary.
  • No training for non-IT staff: Receptionists, accountants, and shop-floor workers often go untrained because owners think only IT people need security training; everyone who touches data must be trained and have records.
  • Losing or disorganizing records: Training records stored in random email folders, WhatsApp groups, or physical papers get lost during audits; use a centralized, searchable system.
  • Language barriers: Training in English only, but staff speak Hindi/Marathi/Tamil; records show they attended but may not have understood—provide materials in local languages and confirm comprehension.
⚖️
Compliance References
StandardRelevant Section
DPDP Act 2023 Section 8 (security obligations) requires reasonable security measures; training records demonstrate due diligence in awareness and capability
CERT-In Guidelines 2022 Direction 2.3.3 requires periodic awareness and training for all staff handling data; records prove compliance
ISO 27001:2022 Clause 6.3 (awareness) and Annex A 6.3 require training and competence records for all personnel
NIST CSF 2.0 Govern Function (GV) and Manage Function (MN) include staff training and awareness as foundational practices

Ready to assess your organisation?

Answer all 191 questions and get your NIRMATA maturity score across all 12 pillars.

Start Free Self-Assessment →

TRUST-IN Bharat · NIRMATA Framework · Licensed CC BY-SA 4.0 · Custodian: Elytra Security

← Back to all guides  ·  trustinbharat.org