Examples of using To sensitive data in English and their translations into Russian
{-}
-
Official
-
Colloquial
Logs of data events can be queried to track changes to sensitive data.
Auditors can gain trusted access to sensitive data when on assignment or when working from home.
Built-in security system guarantees that only authorized personnel gain access to sensitive data.
Center provides guaranteed secure access to sensitive data on individuals and households for the purpose of scientific or historical research.
Many Android phones come with a huge number of preinstalled nonfree apps that have access to sensitive data without users' knowledge.
In particular, the launching of an initiative on open access to sensitive data was considered as a significant step towards greater transparency in the Republic of Moldova.
The tokenization system provides data processing applications with the authority andinterfaces to request tokens, or detokenize back to sensitive data.
In this way users are prevented from requesting tables corresponding to sensitive data or dimension combinations that are meaningless or not planned for dissemination.
This counterfeit mold emulates the unique biometric attributes of an individual so as to confuse the system between the artifact and the real biological target andgain access to sensitive data/materials.
You acknowledge that the Services may not be appropriate for the storage orcontrol of access to sensitive data, such as information about children or medical or health information.
Public-facing web applications are primary targets for attackers, andpoorly coded web applications provide an easy path for attackers to gain access to sensitive data and systems.
The tokenization system must be secured andvalidated using security best practices applicable to sensitive data protection, secure storage, audit, authentication and authorization.
However, third party hosting solutions,including public cloud solutions, might raise confidentiality concerns to some organizations with regard to sensitive data.
Lockable filing cabinets and secure archive rooms, for example,effectively limit access to sensitive data- even if access to the keys is clearly regulated and made safe in everyday office life.
If the most recent patches are not implemented on critical systems as soon as possible, a malicious individual can use these exploits to attack or disable a system, orgain access to sensitive data.
In relation to sensitive data, data recipients should be unambiguously authenticated in the population register, and the data transfer should be encrypted, especially if the transfer is done via the internet.
When properly validated and with appropriate independent assessment,Tokenization can render it more difficult for attackers to gain access to sensitive data outside of the tokenization system or service.
Splunk enables customers to create correlation rules andreports to identify threats to sensitive data or key employees and to automatically demonstrate compliance or identify areas of non-compliance in regards to technical controls.
When tokens replace live data in systems, the result is minimized exposure of sensitive data to those applications, stores, people and processes, reducing risk of compromise or accidental exposure andunauthorized access to sensitive data.
The Executive Directorate will issue formal guidelines on the proper handling,storage and access to sensitive data and it will complete physical security measures to protect the staff, premises and materials of the Executive Directorate by the end of March 2006.
In addition to standardized data, the participants stressed the benefits of standardized software. They agreed that governmental and non-governmental actors and the private sector should work together on data issues and exchange data with one another, while respecting national regulations and privacy issues,including with regard to sensitive data.
A webmaster that we access from our phone would have access to sensitive data about users if they do not use a VPN connection. When we access a website, we have data stored about the location based on IP address, data about OS which we use, and other identification data stored on your phone or personal PC. You have probably heard of"cookies policy"And you have noticed that on most sites you're greeted with acceptance of these policies.
One of the most frequent reasons was the problem of coordination between ministries and other relevant institutions,for instance, to get access to sensitive data or to have the report coordinated/approved for submission.
The right of access to information in turn underpins the remedy of habeas data, guaranteeing the protection of any personal and private data held in archives, records, databases or other electronic media, whether public or private, the public disclosure of which could constitute an invasion of family and/or personal privacy,particularly with regard to sensitive data concerning individuals and their private lives, including their families, which could be in the possession of the bodies specified in article 1.
We need to verify the users who get access to the sensitive data.
The British pound showed indifference to the sensitive data on household spending in the UK.
This could lead to uploading sensitive data to a CUPS resource, or overwriting specific files with the content of a CUPS resource.
What strategies are businesses andgovernments adopting to safeguard sensitive data?
Attackers use this weakness to steal sensitive data or compromise the system altogether.
The challenge would be to find ways to disseminate such sensitive data;