Examples of using Security procedures in English and their translations into Romanian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
Integrated Security Procedures.
Security procedures in place to secure your personal data.
Initiate security procedures.
There is no downside implementing the security procedures.
What security procedures does Booking.
People also translate
I'm prohibited from discussing security procedures.
What security procedures does Booking.
It says he's suffering from radiation poisoning attributed to security procedures.
She knows our security procedures.
What security procedures are put in place to safeguard your personal data?
We are developing Integrated Security Procedures at your company level.
What security procedures do we put in place to safeguard your personal data?
The bank shall dispose of security procedures to ensure the following.
The security procedures in place to protect the misuse of your information.
Finally, he suggested loosening humiliating security procedures at airports, some of them being unnecessary in his opinion.
New security procedures when connecting Hikvision IP cameras using Onvif protocol.
Odo and I are returning to Deep Space 9 after reviewing security procedures at Prophet's Landing the Bajoran colony closest to the Cardassian border.
What security procedures are put in place to safeguard your personal data?
Agreement between Romania and the European Union regarding the security procedures for the exchange of classified information, signed in Bucharest on 22 April 2005.
What security procedures do we have in place to safeguard your personal information?
IT Security Support- identifying and administering the security procedures, disaster-recovery centre, back-up, other procedures; .
Security procedures should be proportionate in order not to hamper scientific progress.
But when he started asking about security procedures, I got suspicious, and I stopped returning his calls.
The security procedures we use are regularly enhanced to reflect technological progress.
Someone, who knows security procedures, has taken some plastic explosives.
We use security procedures to prevent unauthorised access or to prevent the loss of personal data, etc.
Tracking the way how security procedures are upheld, applied and respected.
We also use security procedures and technical and physical restrictions for accessing and using personal data on our servers.
Integrating cyber security procedures into software development(SDLC).
Our site uses acceptable security procedures to maintain the confidentiality of the information.