Примери за използване на Adequate security measures на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Consequently, any personally identifiable information is stored andprotected on servers with adequate security measures.
Adequate security measures have been taken to ensure data encryption during the registration process, i.e.
Also, you have to make sure that sensitive information is handled with adequate security measures when recorded on paper too.
Court testimony revealed a lack of adequate security measures at the Sarafovo Airport located at the seaside resort town of Burgas near the Black Sea.
With regard to the above mentioned purposes, the data is processed through both electronic and manual means, andis protected through adequate security measures.
These subjects are responsible for the implementation of adequate security measures as enshrined in the General Data Protection Regulation.
With regard to the above mentioned purposes, the data is processed through both electronic and manual means, andis protected through adequate security measures.
Due to the nature of the Internet,information can circulate without adequate security measures on the internet and used by unauthorized persons.
We do our utmost to ensure that all information is stored in a safe manner andwe request our service providers to apply adequate security measures.
Due to the nature of the Internet,information can travel on the internet without adequate security measures and can be purchased and used by unauthorized persons.
It is protected by adequate security measures, taking into account the state of art, the costs of implementation and the nature, scope, context and purpose of processing as well as the risk to the rights and freedoms of individuals.
Require the Commission to adopt implementing measures setting out in detail the procedures to be followed,including adequate security measures and safeguards.
(3) A payment service provider must maintain adequate security measures to protect the confidentiality and integrity of payment service users' personalised security credentials.
The servers Kite uses to store this information are accessible to authorised staff only andKite ensures that adequate security measures are in place.
Believing in the manifestation of various miracles,a person begins to neglect adequate security measures, perform logically unjustified actions, and neuropsychiatric diseases and symptoms may occur.
We take adequate security measures to minimize the risks of destruction or loss, including accidental, of data, unauthorized access or unauthorized processing that does not comply with the data collection objectives set forth in our Privacy Policy.
Related to structure of the internet,information can be circulated on the Internet without adequate security measures and can be retrieved and used by unauthorized persons.
However, I am uncertain how the distribution by a selected distributor of a manufacturer's products via the internet could itself lead to an increase in counterfeiting andhow any detrimental effects resulting from such sales cannot be counteracted by adequate security measures.
Due to the nature of the Internet,information can be circulated through the Internet without adequate security measures and can be taken and used by unauthorized persons as well.
DENV-G has implemented adequate security measures in order to maintain integrity and security and prevent accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Personal Data transmitted, stored or otherwise processed, in line with Regulation(EU) 679/2016.
Due to the nature of the Internet,information can be circulated on the internet without adequate security measures and can be taken and used by accessible and unauthorized persons.
Commission Decision C(2006) 3602 on the security of its information systems25 states that each director-general must appoint at least one local information security officer, responsible for ensuring that IT service providers andsystem suppliers introduce adequate security measures.
All answers anddata collected in connection with the survey will be classified confidential and adequate security measures are employed when handling and transferring the data.
You are aware of the fact that without adequate security measures(e.g. secure web browser configuration, up-to-date antivirus software, personal firewall software) there is a risk that the information and passwords you use to protect access to your Personal Information, could be accessed by unauthorized third parties.
All answers and data collected in connection with such surveys will be classified as confidential within KONE and adequate security measures are employed when handling and transferring the data.
You are aware of the fact that without adequate security measures(e.g. secure web browser configuration, up-to-date antivirus software, personal firewall software, no usage of software from dubious sources) there is a risk that the data and passwords you use to protect access to your data, could be disclosed to unauthorised third parties.
When data processing is conducted in another country,all reasonable steps shall be taken to ensure that adequate security measures are observed and that the data protection principles of this Code are respected.
While it remains in Teva's systems the security measures outlined in this Privacy Policy shall always apply andwhen processed in other parties' systems, Teva ensures agreements are in place with such parties that ensure the third party also has adequate security measures in place.
When data processing is conducted in another country,all reasonable steps should be taken to ensure that adequate security measures are in place and that the data protection principles set out in this Code are respected.
With regard to the above mentioned purposes, the data is processed through both electronic and manual means, andis protected through adequate security measures, taking into account the state of art, the costs of implementation and the nature, scope, context and purpose of processing as well as the risk of varying likelihood and severity for the rights and freedoms of individuals.