Примеры использования To control access на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
It is equally important to control access to data within any company.
Norton Secure Login is a service that is also available to other organizations to control access to their websites.
A review related to practices to control access and to provide privacy and protection of data should be conducted.
Apple Files a Patent for a System that Allows to Control Access to Content.
TeleYemen reserves the right to control access to data stored in its system“in any manner deemed appropriate by TeleYemen.”.
Such industrial enclaves tend to be screened off from their surrounding environment in order to control access of persons and products.
Before you can use Authorization Manager to control access to resources, you must create an authorization store.
Current threats require the strengthening of effective measures to safeguard nuclear materials, and to control access to them.
Protection systems Are systems in place to control access/resource use in the Ramsar Site?
It serves to control access to resources(equipment, software, documentation, raw data), data confidentiality, authentication and data integrity.
Supervision(ability of a competent authority to control access and access conditions);
Danger areas are designed to control access to places that are most likely to suffer the damaging or injurious effects of an accidental stockpile explosion.
Security forces andthe military made concerted efforts to control access to information about the protests.
While it would be necessary to control access through High Contracting Parties, the upload of data could be field or office enabled using portable or fixed equipment.
Security Level 1 At security level 1, the SSP should establish the security measures to control access to the ship, where the following may be applied.
For example, you may create one application to control access to a Web site and another application to control access to functions in a particular line-of-business software program.
You can specify the lines and phones available to specific users anduse domain security to control access to telephony resources.
This time it's a system that allows to control access to content using a person's physical features.
According to the European Population Conference,the Governments of countries of destination had the right to control access to their territories.
This type of heritage is the easiest to protect and manage owing to the limited extent of these areas, andbecause in general it is possible to control access to the sites.
Before you can effectively use Authorization Manager to control access to resources, you must define groups of users.
Because they use shared resources, concurrent systems in general require the inclusion of some kind of arbiter somewhere in their implementation(often in the underlying hardware), to control access to those resources.
Governments of countries of destination have the right to control access to their territory and adopt policies that shape immigration flows.
The procedures to control access to ships are carried out through the respective agencies representing them, which have to submit requests for authorization to the local maritime authorities.
This can occur only if those parties have the capacity to control access to the basic raw material of this industry- genetic resources.
There are different configurations of access control systems: the most common of these are designed only for one door, andthe most complex are designed to control access for large enterprises, factories, banks, etc.
Before you can use Authorization Manager to control access to resources, you must create the definitions required to describe the environment you want to create.
In December 2011, for example, the Syrian Armed Forces reportedly erected a barrier to control access to Ibn Sina Hospital in Rif Dimashq.
While such information cannot used to control access, it can be useful feedback to be obtained on a voluntary basis.