Examples of using Modification or deletion in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
Value modification or deletion can make some apps quit with unexpected errors.
Users are the sole owner of their data and can request modification or deletion at any time.
Modification or deletion will be made promptly and at the latest within eight working days of receipt of your request.
Users are the sole owners of their data and may request its modification or deletion at any time.
No termination, interruption, modification or deletion of the Services will likely result in compensation to the User.
(c) to prevent the unauthorised entry of data and any unauthorised consultation, modification or deletion of data;
No termination, interruption, modification or deletion of the Services will grant a right to compensation to the User.
The Hotel and Restaurant will prevent the unauthorised reading, creating, copying,transmission, modification or deletion of records containing personal information.
Modification or deletion will be made promptly and at the latest within eight working days of receipt of your request.
Prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data(storage control);
The modification or deletion will take place as soon as possible and at the latest within eight working days from the reception of your request.
(d) prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data(storage control);
Modification or deletion will take place as soon as possible and at the latest within eight working days starting from when your request is received.
(h) to prevent the unauthorised reading, copying, modification or deletion of data during the transmission of data and the transport of data media.
(c) prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data(storage control);
(j) prevent the unauthorised reading, copying, modification or deletion of personal data during the transmission of personal data toor from the interoperability components or during the transport of data media, in particular by means of appropriate encryption techniques;
Prevent the unauthorised input of data and the unauthorised inspection, modification or deletion of stored personal data(storage control);(d).
Prevent the unauthorised reading, copying, modification or deletion of personal data during the transmission of personal data toor from the EES or during the transport of data media, in particular by means of appropriate encryption techniques(transport control);
Prevent the unauthorised input of personal data and the unauthorised inspection, modification or deletion of stored personal data(‘storage control');(d).
Prevent the unauthorised reading, copying, modification or deletion of personal data during transfers of personal data or during transportation of data media(‘transport control');
(e)prevent the unauthorised processing of data in the ECRIS-TCN system and any unauthorised modification or deletion of data processed in the ECRIS-TCN system;
(h) to prevent the unauthorised reading, copying, modification or deletion of data during the transmission of data and the transport of data media.
(e) prevent the unauthorised processing of data in the VIS and any unauthorised modification or deletion of data processed in the VIS(control of data entry);
Personal data is mapped to allow collection, storage,usage, modification or deletion of such data according to GDPR requirements and data subjects' requests.
Prevent the unauthorised processing of data in the EES and any unauthorised modification or deletion of data processed in the EES(control of data entry);
(e) prevent the unauthorised processing of data in the Central Repository andany unauthorised modification or deletion of data processed in the Central Repository(control of data entry);