Examples of using Security guidelines in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
NIST-800 Security Guidelines.
In view of the high-risk nature of the sector the International RoadTransport Union has, as indicated in point 3.2, drawn up Security Guidelines.
Implement security guidelines;
The coordinating international organisation, the International Road Transport Union(IRU),has drawn up security guidelines for managers, drivers and consignors.
NIST-800 Security Guidelines.
In addition, the care is secret, without medical prescription and easily online instead-the highest security guidelines(SSL encryption, data privacy, etc.) are met.
Our proven security guidelines on sealing LCL containers were adopted as best practice by several customers.
Mobile Device Security Guidelines.
So help us ensure the security of your data by keeping your unique passwords and other access information for our services secret andplease follow the basic security guidelines.
The Road Transport Security Guidelines drawn up by the IRU.
Act no. 428/2002 was amended in 2005 and some of its basic provisions were changed,including those related to security projects and security guidelines.
Rellox has in place internal security guidelines and personal data protection guidelines. .
Research grants should not only be conditioned upon the quality of a proposal, but also upon the ability of the given applicant to comply withbio-standards as well as possible future security guidelines.
A Document Information Panel is subject to the same security guidelines and restrictions as an InfoPath form.
The agency has released security guidelines for medical devices in collaboration with clinicians, device manufacturers, academics, patients, and other government entities.
Com is committed to a code of conduct from the Interactive Gaming Council(a non-governmental organizationPersonal client information that enforces certain security guidelines among its members).
The SAA shall approve security guidelines on the qualification and approval of non-cryptographic IT security products.
In addition, the checkout process is confidential, without medication regulations& easy online-all important security guidelines(SSL encryption, data privacy& Co.) are complied with.
The final part of the security project are security guidelines. Their purpose is, on the basis of the risk analysis, to adopt such measures that will minimize risks identified in the risk analysis.
In addition, the purchase is confidential, no prescription and moreover easily via the network instead-the purchase is namely in accordance with the common security guidelines(SSL encryption, data privacy, etc.).
The measures mentioned in the previous sentence are specified in the Security Guidelines of the Operator, which must be updated to always correspond with the changes accepted during the whole duration of processing.
In addition, the purchase is discreet, without a doctor's prescription and, moreover, uncomplicated via theInternet- here, all central security guidelines(SSL secrecy, data protection& Co.) are complied with.
In addition, the acquisition, the private sphere, without medical prescription and simply online takes place- namely,the procurement is in accordance with the important security guidelines(SSL secrecy, data privacy, etc.).
Enterprise customers can request early access to Identity Provider Connection, to reduce user management overhead,align with security guidelines, and ensure that only approved users can access TeamViewer accounts using corporate email addresses.
In addition, the entire purchase is confidential, without medical instruction and also easy online instead- the acquisition is done here, of course,in accordance with current security guidelines(SSL secrecy, data privacy& Co.).
(61)In order to raise awareness and facilitate the acceptance of future EU cyber security schemes,the European Commission may issue general or sector-specific cyber security guidelines, e.g. on good cyber security practices or responsible cyber security behaviour highlighting the positive effect of the use of certified ICT products and services.
In addition, the care takes place, the private sphere while, without medical prescription and also simple over the network instead- the purchase is done, of course,in accordance with current security guidelines(SSL secrecy, privacy and so on).
In addition, anyone can buy the goods discreetly without a prescription via mobile phone and tablet-of course the highest security guidelines(SSL secrecy, data protection et cetera) are respected.
In addition, the entire purchase takes place anonymously, without a prescription and without any problems on theInternet- all important security guidelines(SSL secrecy, data protection et cetera) are complied with.
Mobile Network Security Guideline.