Examples of using Security policy in English and their translations into Czech
{-}
-
Official
-
Colloquial
Unfortunately, it has a split personality in security policy terms.
Student-tracking and security policy financially supplemented at the federal level. Second, there will be a mandatory.
This conflict highlights the need for us to build a common foreign and security policy.
Indeed, a key objective of the Common Foreign and Security Policy is to consolidate democracy, rule of law, and, respect for human rights.
Mr President, this report deals with the common foreign and security policy in 2008.
People also translate
In writing-(RO) Stabilizing Afghanistan represents a key security policy challenge for the international community and the fight against terrorism.
There are other things that are funded from the European Union's budget that are directly linked to security policy.
Even the crisis in the financial markets has a security policy dimension, as do the food and commodities situations, not forgetting the usual concerns.
I think that these measuresfrom the Commission and these proposals are just the start of devising an energy security policy.
Vice-President of the Commission andHigh Representative of the Union for Foreign Affairs and Security Policy.- Mr President, today I sit in the Commission's space as well.
He works on EU integration and foreign policy, transatlantic affairs, andGerman for- eign and security policy.
Fourthly, how can we envisage a future Europe with a common foreign and security policy when we lack such a fundamental element in the form of a common position?
Intergovernmental solutions in this area are the way forward that is compatible with an independent national foreign and security policy.
The entire development policy andthe Common Foreign and Security Policy cover this whole spectrum.
The European Union must develop a single energy security policy as soon as possible, with Member States renouncing individual interests and necessarily involving South Caucasian countries.
These objectives will only materialise with an effective common foreign and security policy(CFSP) shared by all the EU Member States.
In the diplomatic field,in the economic field, in security policy and in defence policy, we do need a close partnership with our colleagues in the United States, but as equal partners on an equal footing.
In writing.-(PL) I gave Mr Jacek Sarysz-Wolski's report, on the main features of the common foreign and security policy, my unequivocal support.
The programme curriculum is closely linked to the security policy implemented within the security system of the Czech Republic and builds on several of the following principles.
Despite the many alternatives, USB is still the most prevalent option chosen by businesses for transferring data-provided their in-house security policy permits it.
The CAP is an important element of the EU food and security policy and after 2013,it will play a significant role in development policy and in external food security policy.
Finally, I would like to say that support for democracy should be higher up the agenda in the Union's foreign and security policy and development policy. .
Sanctions against terrorists are taken in the context of the common foreign and security policy, and the Commission is associated with decisions taken unanimously by the Member States in the Council.
In Congo, Europe has managed to prove once more how divided and how weak it is andwhat an illusion it would be to think that a common foreign and security policy would be possible at this stage.
High Representative of the Union for Foreign Affairs and Security Policy and Vice-President of the Commission.- Mr President, I am pleased to have this opportunity to make a statement on Kyrgyzstan.
A simultaneous investment in climate-smart technology andemployment will also stabilise the security policy situation with regard to Russia.
If your security policy doesn't support cloud applications, the On-Premise variation will make sure the MeetingRoomApp server is installed directly on your virtual servers in your infrastructure Debian, Ubuntu, RedHat, Windows.
Information Security Management System, ISMS design, building, performing,"Plan-- Do-- Check-- Act" cycle in ISMS, Information Security Policy, Risk Analysis and Risk Management in the enterprise IS.
I voted in favour of this report as I agree with the need for financial andhuman resources to be allocated with a view to the participation of women and gender mainstreaming in the field of foreign and security policy.
We will vote tomorrow for the opening of the chapters on fundamental rights and judiciary andon the common foreign and security policy, not because we want to be weak on these issues, but because we want to be strong.
