Примери за използване на Use of encryption на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
This is most likely due to the use of encryption.
Extensive use of encryption can reduce total cost of a breach by $360,000.
ICPA complies with the adopted data protection standards,including the use of encryption and SSL services.
The use of encryption by tech companies has come under criticism from U.S. law enforcement agencies.
Data transfer technology ensures security through the use of encryption protocols and a 3-D Secure system.
When we transmit highly confidential data(such as a credit card number or password) over the internet,we protect it through the use of encryption.
TorGuards Stealth VPN technology hides the use of encryption and can be used to circumvent blocking/ censorship of VPNconnections using. .
When we process highly confidential information(such as credit card numbers) over the Internet,we protect it through the use of encryption.
For example, depending upon the applications, we employ the use of encryption technologies and user authentication systems such as passwords and personal identification numbers.
The solution to privacy concerns lies not in data localization, butin the development of secure systems and the proper use of encryption.
The country's existing cybersecurity laws are already set to punish the use of encryption deemed to threaten the state, but there once again appears to be an asterisk next to the encryption endorsement-- you can't design something that might challenge the regime.
When personal information is transmitted to other websites,it is protected through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
Prior to Debian 3.1, there was also a Non-US packages archive(debian-non-US/)which included Debian packages that could not be distributed in the United States due to software patents or use of encryption.
Calls on the Commission to mitigate the risks for EU space assets by taking adequate measures, including,where appropriate, the use of encryption, for the protection of space-related infrastructure against cyber-threats;
Prior to Debian 3.1, there was also a Non-US packages archive(debian-non-US/)which included Debian packages that could not be distributed in the United States due to software patents or use of encryption.
Counter the criminalisation of the use of encryption, anti-censorship andprivacy tools by refusing to limit the use of encryption within the EU, and by challenging third-country governments that criminalise such tools.
When personal information(such as a credit card number) is transmitted to other Web sites,it is protected through the use of encryption, such as the(SSL) protocol.
Counter the criminalisation of the use of encryption, anti-censorship andprivacy tools by refusing to limit the use of encryption within the EU, and by challenging third-country governments that criminalise such tools.
When personal information(such as a credit card number) is transmitted to other website,it is protected through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
Urges the EU to counter the criminalisation of human rights defenders' use of encryption, censorship-bypassing and privacy tools,by refusing to limit the use of encryption within the EU, and to challenge third-country governments that level such charges against human rights defenders;
When we transmit highly confidential information(such as credit card number or password) over the internet,we protect it through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
For example, we store the personal data you provide on computer servers with limited access that are located in controlled facilities, and when we transfer certain highly confidential or sensitive personal information,we protect it through the use of encryption.
When sensitive personal information(such as a credit card number) is collected on our site and/or transmitted to other websites,it is protected through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
ASBIS ME meets accepted standards of security for all transactions that may involve payment of fees through a service available through this site,including the use of encryption and SSL services.
Additionally, if we transmit sensitive personal information(such as a credit card number) over the Internet,we protect it through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
Nauticus meets accepted standards of security for all transactions that may involve payment of fees through a service available through this site,including the use of encryption and SSL services.
The data controller has implemented appropriate technical and organizational protection measures and applied those measures to the data covered by the data protection incident,in particular measures such as the use of encryption that render the data unintelligible to any person who is not authorised to access the data;
We comply with generally accepted standards for the protection of collected personal data both during their transfer, and during their receipt and storage,including the use of encryption, where necessary.
We apply generally accepted standards for the storage and protection of personal data we collect, both during transmission and after download and storage,including the use of encryption, where suitable or necessary.
It examines the factors that have contributed to the growing vulnerability of control systems, andpresents new standards designed to protect critical infrastructure including the use of encryption and authentication for SCADA systems.