Examples of using Security rules in English and their translations into Croatian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
New security rules.
Contributions in kind shall comply with national tax and social security rules.
Article 62 Security rules on the protection of classified information.
Moreover, it is important to continue bringing social security rules in this area into line with EU rules. .
Article 26- Security rules on the protection of classified and sensitive.
Parliament undertakes to adapt, where necessary,its internal provisions so as to implement the security rules for confidential information laid down in this Annex.
Security rules on the protection of classified and sensitive non-classified information.
Member States set their own social security rules in line with their own circumstances.
Security rules on the protection of classified information and non-classified sensitive.
Queen Anne Hotel recognizes the importance of information security, and is constantly reviewing and enhancing our technical, physical,and logical security rules and procedures.
Security rules on the protection of classified and sensitive non-classified information.
This IIA makes the basic principles andminimum standards for protecting classified information applicable respectively under the European Parliament's and the Council's security rules the same.
The following specific security rules shall apply to actions funded from Horizon Europe.
The results of research funded by theAgency shall be published, unless the applicable rules of intellectual property law or the security rules of the Agency referred to in Article 112 preclude such publication.
Security rules on the protection of sensitive non-classified information and classified information.
Known supplier of airport supplies' means a supplier whose procedures meet common security rules and standards sufficient to allow delivery of airport supplies to security restricted areas.
Security rules on the protection of classified information and sensitive non-classified information.
Detailed rules on the operation of the central repository andthe data protection and security rules applicable to the repository shall be adopted in accordance with the examination procedure referred to in Article 352.
The security rules of the Agency shall cover, inter alia, provisions for the exchange, processing and storage of such information.
Detailed rules on the conditions for operation of the web service andthe data protection and security rules applicable to the web service shall be adopted in accordance with the examination procedure referred to in A rticle 612.
Article 25- Security rules on the protection of classified and sensitive non-classified information.
For the purpose of this chapter,‘regulated supplier of in-flight supplies' means a supplier whose procedures meet common security rules and standards sufficient to allow delivery of in-flight supplies directly to aircraft.
Article 29 refers to the security rules for protecting classified and sensitive non-classified information to be adopted by BEREC.
SST information and services shall be made available on a need-to-know basis to the recipients of the SST services defined in Article 5(2),in accordance with the instructions and security rules of the originator of the information and of the owner of the space object concerned.
To correspond with our security rules, the password must consist of no less than 8 characters.
Before being granted access to classified information, Members of the European Parliament shallbe briefed on and acknowledge their responsibilities to protect such information in accordance with the European Parliament's security rules, and briefed on the means of ensuring such protection.
The security rules of the Agency shall cover, inter alia and where appropriate, provisions for the exchange, processing and storage of such information.
Member States' authorities, agencies andother bodies using the communication network shall ensure that equivalent security rules and standards as those applied by the Agency are complied with for the handling of classified information.
The security rules of the Agency shall cover, inter alia, provisions for the exchange, processing and storage of EUCI and sensitive non-classified information.
Member States' authorities, agencies andother bodies using the communication network shall ensure that equivalent security rules and standards as those applied by the Agency are complied with for the handling of classified information. CHAPTER IISituational Awareness.