Examples of using Use of encryption in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Appropriate use of encryption https.
When we transmit highly confidential data over the Internet,we protect it through the use of encryption.
The use of encryption can slow down communications.
Over recent weeks,Australia has been leading the charge to thwart the use of encryption by terrorists.
Furthermore, the use of encryption is expressly recommended by some search engines, e. g.
It makes sense toemphasize that the young man stole a scooter without the use of encryption, keylogginga, hacking, kryakinga“and without” trojan“software.
The use of encryption or obfuscation to make analysis more difficult.
The report also finds that the extensive use of encryption can save organizations an additional $385K.
Specific safeguards are needed, suchas the accountability of data controllers for multi-national data exchange and the use of encryption for more sensitive data.
You recognize the use of encryption at the address bar of the browser.
Although this facility is not used currently is transmitted to other websites,it is protected through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
Furthermore, the use of encryption with a key known only to the customer in question minimises the possibility of internal fraud.
When personal information(such as a credit card number) is transmitted to other Web sites,it is protected through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
You are responsible to ensure the use of encryption is legal and accepted in your country or locality.
When personal information(such as a credit card or bank account number) is transmitted to other websites,it is protected through the use of encryption, such as the Secure Sockets Layer(SSL) protocol.
These solutions involve the use of encryption and digital signatures, new access control and authentication tools and software filters of all kinds3.
Setting security to authdynenc allows systems to dynamically negotiate the use of encryption for traffic that matches a given Windows Firewall rule.
These measures include the use of encryption, rest encryption, protection of employee devices, other technical devices, information, IT-infrastructure, and internal networks.
CAcert's goal is to promote awareness and education on computer security through the use of encryption, specifically by providing cryptographic certificates.
If you have any questions on the use of encryption in your country or locality, please check with your local retailer or email protected.
When personal information(such as a credit card number) is transmitted to other Web sites,it is protected through the use of encryption, such as the Secure Socket Layer(SSL) protocol. Changes to this Statement.
Almost half(48%) believed trust will be strengthened thanks to a variety of current trends including better online identity-verification systems,tighter security standards and wider use of encryption.
Description Baseline Baseline protection measures are all modern standard securitymeasures, like OS hardening, use of encryption in communications, secure storing procedures for passwords, defensive programming, etc.
The use of encryption on a drive usually doesn't impede data recovery as long as the encryption key is available while its loss makes it impossible to decrypt the volume and thus retrieve its files.
When sensitive personal information(such as a credit card number) is collected on our site and/or transmitted to other websites,it is protected through the use of encryption, such as the Secure Socket Layer(SSL) protocol.
Which is affiliated to the Tunisian Ministery of Communications,oversees the deployment of Internet in Tunisia and notably controls the use of encryption technologies to enable secure transactions on Internet in the framework of the country's e-commerce strategy.
When communicating by e-mail, confidentiality of the content cannot be guaranteed without additional security measures,so we recommend the use of encryption or similar security measures for confidential information.
You also agree to comply with all laws from the country in which You reside that are applicable to the transmission of data on the Internet, including, but,not limited to laws governing the use of encryption and laws governing the transmission of data across international boundaries, into prohibited countries, and containing personally identifiable information.
The data controller has implemented appropriate technical and organizational protection measures and applied those measures to the data covered by the data protection incident,in particular measures such as the use of encryption that render the data unintelligible to any person who is not authorised to access the data;
Each Party may, in urgent circumstances, make requests for mutual assistance or communications related thereto by expedited means of communication, including fax or e-mail, to theextent that such means provide appropriate levels of security and authentication(including the use of encryption, where necessary), with formal confirmation to follow, where required by the requested Party.