Mechanisms exist to provide role-based cybersecurity & data privacy-related training: ? Before authorizing access to the system or performing assigned duties; ? When required by system changes; and ? Annually thereafter.