Примери за използване на Malicious use на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Malicious use of artificial intelligence and fundamental rights.
Encryption works to prevent any malicious use of your personal information.
So far, the toolbox has been used twice: to start a dialogue with the United States after the Wannacry attack171, andto develop Council conclusions condemning the malicious use of ICT172.
This is to prevent malicious use of the email system by anonymous users.
Developments must ensure the safety of AI-based applications, assess the risks andmitigate its potential for malicious use and unintended discrimination such as gender or racial bias.
This is to hjodring malicious use of the e-mail system by anonymous users.
Aladin Foods Ltd. will make every reasonable effort to maintain the security of your personal information and protect it from malicious use, unauthorized interference, loss or unauthorized access, alteration or disclosure.
The researchers said the malicious use of AI poses imminent threats to digital, physical and political security by allowing for large-scale, finely targeted, highly efficient attacks.
In an attempt to prevent such democratic disruptions, governments in the Asia Pacific region are accelerating efforts to fight malicious use of online media, unveiling laws that make it easier to target websites which enable distribution of criminal or fraudulent content.
The report said that the malicious use of AI poses imminent threats to digital, physical and political security by allowing for large-scale and much more efficient attacks within the next five years.
Until sound legislation is put in place andconsumers come to trust that they will be protected from malicious use and that they understand at least in theory how the AI systems make decisions, the new technologies will not be embraced.
The frivolous, vexatious or malicious use of the law and legal process, with the high legal costs required to fight such law suits, can become a means of pressure and harassment, especially in the context of multiple law suits.
We use this information to better understand users' behavior to further improve our offerings as well as to prevent malicious use such as hacking and denial of service attacks.
The risk consists of loss of access to accounts, malicious use of financial assets, and complete compromise of our personal information.
That is why we protect your data by applying all appropriate technical and organizational measures at our disposal to prevent unauthorized access,unauthorized or malicious use, loss or premature deletion of information.
Leaving the signature plugged into the computer creates a condition for malicious use and potential abuse which will lead to negative consequences for the author's signature;
That is why we protect your data by applying all appropriate technical and organizational means we have in order not to allow unauthorized access,unauthorized or malicious use, loss or premature deletion of information.
(Bloomberg) Governments in the Asia Pacific region are accelerating efforts to fight malicious use of online media, unveiling laws that make it easier to target websites which enable distribution of criminal or fraudulent content.
Therefore we protect your personal data by applying every appropriate technical and organizational means, with which we prevent unauthorized access,unauthorized or malicious use, loss or premature deletion of information.
The Council conclusions adopted on 16 April 2018 on malicious cyber activities firmly condemned the malicious use of information and communications technologies(ICTs) and stressed that the use of ICTs for malicious purposes is unacceptable as it undermines the stability, security and benefits provided by the internet and the use of ICTs.
We protect your personal information by applying all necessary technical and organizational means available to us in order to prevent unauthorized access,unauthorized or malicious use, loss or untimely deletion of information.
Com is not liable and is expressly exempted from a liability for any damages incurred by the Users, Carriers and/or third parties as a result of improper,unauthorized and/or malicious use of the functionality of the website, and/or of the information contained therein, for purposes other than those provided for in these General Terms and security rules for the administration of personal information.
Therefore, we will protect your personal data by applying any appropriate technical and organizational tool available to us so as to prevent unauthorized access,unlicensed or malicious use, loss or premature deletion of information.
We use this information to pursue our legitimate interests to better understand users' behavior to further improve our offerings as well as to prevent malicious use such as hacking and denial of service attacks.
That is why we strive to protect your data as we apply all appropriate technical and organizational means, that we have available, so as not to allow any unauthorized access,unpermitted or malicious use, loss or premature deletion of information.
That is why we shall make our best endeavors and take responsibility to protect the personal data provided by our partners, customers or subcontractors and shall not allow unauthorized access,unauthorized or malicious use, loss or erasure of information.
User is responsible for giving contact information and other data that are incorrect, false or concerning third parties(in all cases where third parties have not given their consent)as well as any illegal or malicious use of personal data and information.
That's why we protect your data by applying all proper and adequate technical and organizational means regarding potential risks to the rights and freedoms of natural persons in order to prevent unauthorized access,unauthorized or malicious use, loss or untimely deletion of information.
The security of the data you entrust to EGT is important to the company, therefore EGT protects your data by applying all appropriate technical and organizational means at its disposal to prevent unauthorized access,unauthorized or malicious use, loss or premature deletion of information.