Examples of using Data processing operations in English and their translations into Croatian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Many data processing operations are only possible with your express consent.
When you play a video,this could trigger further data processing operations.
Many data processing operations are only possible with your express consent.
In addition, Europol shall be responsible for all data processing operations carried out by it.
Many data processing operations are only possible with your express consent.
The legality of the previously announced data processing operations remain unaffected by the revocation.
Many data processing operations are only possible with your explicit consent.
The following statements are general and comprehensively cover all data processing operations within the WALTER GROUP.
The legality of the data processing operations carried out until the revocation remains unaffected by the revocation.
Revocation of your consent to the processing of your data Many data processing operations are only possible with your express consent.
Eu-LISA shall keep logs of all data processing operations within the ETIAS Central System involving access by the central access points referred to in Article 50(2) for the purposes of Article 1(2).
To an informal notification by e-mail reaches us. The legality of up to cancellation made data processing operations remain unaffected by the revocation.
We have no influence on the collected data and data processing operations, nor are we aware of the full extent of data collection, the purpose of the processing, the retention periods.
For the purposes of technical maintenance, eu-LISA shall have access to the necessary information relating to the data processing operations performed in the EES.
Eu-LISA shall keep records of all data processing operations performed within the ETIAS Information System.
The decisions of the independent supervisory authority regarding exemptions, guarantees, authorisations andconditions relating to data processing operations, as defined in this Regulation, should be published in the activities report.
Eu-LISA shall keep logs of all data processing operations within the ETIAS Information System involving the access by border authorities referred to in Article 47 and the access by immigration authorities referred to in Article 49.
The decisions of the European Data Protection Supervisor regarding exemptions, guarantees, authorisations andconditions relating to data processing operations, as defined in this Regulation, should be published in the activities report.
Each Member State andEuropol shall ensure that all data processing operations resulting from requests for comparison with Eurodac data for the purposes laid down in Article 1(2)(1)(c) are logged or documented for the purposes of checking the admissibility of the request, monitoring the lawfulness of the data processing and data integrity and security.
For the purposes of monitoring the functioning of the system and its technical maintenance,eu-LISA shall have access to the necessary information relating to the data processing operations performed in the ECRIS-TCN system and the ECRIS reference implementation.
Each Member State andEuropol shall ensure that all data processing operations resulting from requests to access to EES data in accordance with Chapter IV are logged or documented for the purposes of checking the admissibility of the request, monitoring the lawfulness of the data processing and data integrity and security, and self-monitoring.
That officer should be a person with expert knowledge of data protection law andpractices, which should be determined in particular according to the data processing operations carried out by the controller or the processor and the protection required for the personal data involved.
Each Member State andEuropol shall ensure that all data processing operations resulting from requests to access to EES data for the purposes laid down in Article 1(2) are logged or documented for the purposes of checking the admissibility of the request, monitoring the lawfulness of the data processing and data integrity and security, and self-monitoring.
That officer should be a person with expert knowledge of data protection law andpractices, which should be determined in particular according to the data processing operations carried out and the protection required for the personal data processed by the controller or the processor.
Each Member Stat andEuropol shall ensure that all data processing operations resulting from requests for comparison with EURODAC data pursuant to this Regulation are logged or documented for the purposes of checking the admissibility of the request monitoring the lawfulness of the data processing and data integrity and security and for self-monitoring.
That officer should be a person with expert knowledge of data protection law andpractices, which should be determined in particular according to the data processing operations carried ou t and the protection required for the personal data processed by the controller or the processor.
Each Member State andEuropol shall ensure that all data processing operations resulting from requests to access to EES data for the purposes laid down in Article 1(2) are logged or documented for the purposes of checking the admissibility of the request, monitoring the lawfulness of the data processing and data integrity and security, and self-monitoring.
The"European Data Protection Seal" shall be valid for as long as the data processing operations of the certified controller or processor continue to fully comply with this Regulation.
Each Member State andEuropol shall ensure that all data processing operations resulting from requests for comparison with Eurodac data for the purposes laid down in Article 1(2)(1)(c) are logged or documented for the purposes of checking the admissibility of the request, monitoring the lawfulness of the data processing and data integrity and security, and self-monitoring. 2.
Organizations may wish for practical orother reasons to apply the Principles to all their data processing operations, but they are only obligated to apply them to data transferred after they enter the safe harbor.