Examples of using Identifying data in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
The effective owner's identifying data;
No identifying data is recorded.
Any information collected will not have any identifying data.
Identifying data that serves the identification of the individual.
The chip- basically the brain or memory that stores the identifying data;
All names and identifying data have been changed for confidentiality.
Delete, manipulate or otherwise alter the"copyright" and other identifying data of the GREENICE Rights Reserve.
Name/ identifying data(first/ last name, academic title/ occupation, birth date, gender,….).
Finally, we also collect some information about our site visitors without any individually identifying data specific to you.
As user identifying data is not required and cannot be provided during the upload, the session closes as soon as the browser is closed.
The data obtained by the Operators as a result of using the data filesmay not be linked to any of the users' identifying data.
These data cannot be linked to your identifying data and cannot be transferred to third parties without your consent.
The sensors can transfer information about the monitored system statusover a high-speed IO-Link communication standard COM3, as well as identifying data and parameters for self-diagnostics.
Your identifying data(for example, your name, surname, language and country from which you interact with us, contact information, etc);
The QSAR Toolboxis a software application which supports companies in identifying data that may be relevant for assessing the hazards of chemicals.
The patient's identifying data will be replaced by a unique identifier which will not allow identification of the patient to anyone else other than the healthcare provider(pseudonymisation);
We may provide aggregate statistics about users, traffic patterns and related site data to reputable third-parties,but these statistics will include no personally identifying data.
User control over the uploaded images As user identifying data is not required and cannot be provided during the upload, the session closes as soon as the browser is closed.
We may provide aggregate information about our customers, Web site traffic patterns and related Web site information toour partners, but this information will not include any kind of personally identifying data.
Artificial identifying data are generated data based on mathematical or other algorithms, in particular, the taxpayer identification number, identity card number, passport number, consumer number, etc.
If the insolvent debtor is a legal person,a businessman or a private individual, by any identifying data used for entry in the court or business register, and by tax identification number.
Keep in mind that there are several other uses of Logana's associative text processing technology(phoneme-based speech recognition, finding mutant gene sequences in DNA chains, comparing text documents,processing similiarity data, identifying data conections etc.).
To allow the Data Controller to have access to the Customer's identifying data during the use of the services of the webstore, enabling direct contact and the identification of the Customer in the case of shopping, as well as direct and efficient administration, transportation; and.
The following personal data(Data) referring to you(Data Subject) will be processed, such as, merely by wayof example, common data, personal details, identifying data, contact data, employer and work duties.
(3) The holdings of the decision shall contain the Constitutional Court's decision in the merits of the case,the provision on the publication in the Hungarian Official Gazette, the identifying data of the judicial decision, in the case of annulling a rule of law or an individual judicial decision, the provision on the annulment, in the case of annulling a rule of law, the provision on the scope of annulment and the date of losing force.
Aggregated or de- identified data.
Identify data to be collected, including data on investigations, freezing or seizing, confiscation and convictions for money laundering/terrorist financing39.
The program offers extended flexibility in form of saved scan results which can be resumed, selective search, filters for effective searching, distinction between valid and invalid files,etc. The programs does a deep scan of the device and successfully identifies data missed by other programs.